MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 034c4dc5c694755d9ad90526bff5e54caaa1bef51e579a8deda6f66c70caf76a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ModiLoader


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: 034c4dc5c694755d9ad90526bff5e54caaa1bef51e579a8deda6f66c70caf76a
SHA3-384 hash: 968e9f6e24ca9c1a204d2f317b4a88169ecdae8efeb9d0f79b865a41bd0b13f4942851e24c0a97d6ac74d6b90d47353f
SHA1 hash: 9e996f89f7f9d4488e4bb5d9446ea4acdebe2530
MD5 hash: e50d9edfd9316c650643be0a78af90f0
humanhash: rugby-march-california-winner
File name:90434333221443543.exe
Download: download sample
Signature ModiLoader
File size:1'053'696 bytes
First seen:2022-11-15 11:36:18 UTC
Last seen:2022-11-21 11:21:06 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 792178d34a808a8476c3424485de2766 (1 x ModiLoader, 1 x DBatLoader)
ssdeep 12288:J1hUaCeWj1PeFuwZFADqn8aZRC5osNOufMLOZnDv+T:JUv1GbaLWRC9NOuf8N
Threatray 20'429 similar samples on MalwareBazaar
TLSH T10725AD62A2914433C0622A789C1BD779542ABEA43F24A84627F53D4F7F7BF91383524F
TrID 68.5% (.EXE) Win32 Executable Borland Delphi 7 (664796/42/58)
27.0% (.EXE) Win32 Executable Borland Delphi 6 (262638/61)
1.4% (.EXE) Win32 Executable Delphi generic (14182/79/4)
1.3% (.SCR) Windows screen saver (13097/50/3)
0.4% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 1986013121d9c969 (1 x ModiLoader, 1 x Formbook, 1 x DBatLoader)
Reporter adrian__luca
Tags:exe ModiLoader

Intelligence


File Origin
# of uploads :
3
# of downloads :
174
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
90434333221443543.exe
Verdict:
Malicious activity
Analysis date:
2022-11-15 12:03:25 UTC
Tags:
formbook trojan stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Sending a custom TCP request
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
keylogger overlay
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DBatLoader
Detection:
malicious
Classification:
troj
Score:
60 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected DBatLoader
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Remcos
Status:
Malicious
First seen:
2022-11-15 07:48:45 UTC
File Type:
PE (Exe)
Extracted files:
52
AV detection:
21 of 25 (84.00%)
Threat level:
  5/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:formbook family:modiloader family:xloader campaign:uj3c loader persistence rat spyware stealer trojan
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops file in Program Files directory
Suspicious use of SetThreadContext
Adds Run key to start application
Reads user/profile data of web browsers
ModiLoader Second Stage
Xloader payload
Formbook
ModiLoader, DBatLoader
Xloader
Verdict:
Informative
Tags:
n/a
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

ModiLoader

Executable exe 034c4dc5c694755d9ad90526bff5e54caaa1bef51e579a8deda6f66c70caf76a

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments