MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0d6eb762b7de41274a26d00d166f1798525cc0d7d54180e251cbc2449a5f9391. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ModiLoader


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: 0d6eb762b7de41274a26d00d166f1798525cc0d7d54180e251cbc2449a5f9391
SHA3-384 hash: fdceb297738f76e284df943380400e202064f90f51307dd08bc866c8d958daa6c21ccd7dceac43e3696eac306cddb51f
SHA1 hash: 7be5ffa1dae807f856bb476fe837df5be5fbadc8
MD5 hash: 0b127898f239904c2db08f50dc3305b8
humanhash: river-five-violet-tennessee
File name:Cogigqkbkuvzlh.exe
Download: download sample
Signature ModiLoader
File size:1'042'432 bytes
First seen:2022-11-21 17:51:02 UTC
Last seen:2022-11-21 19:39:02 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2873f01e1e89c633ff4ae4fb234a2a76 (3 x ModiLoader, 1 x Formbook, 1 x AveMariaRAT)
ssdeep 24576:s1ZIJHZxeAaa3RSGKzsofHq5oOqLM2xk/f:s1ZIEoyHq59/
TLSH T12A25BF23E2919876E133133A5D1B47DEA91A7F103C24BC5A67F57D4E7E3E242382A163
TrID 44.6% (.EXE) InstallShield setup (43053/19/16)
14.7% (.EXE) Win32 Executable Delphi generic (14182/79/4)
13.5% (.SCR) Windows screen saver (13097/50/3)
10.9% (.EXE) Win64 Executable (generic) (10523/12/4)
4.6% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 903cec8cb2929e69 (4 x ModiLoader, 1 x Formbook, 1 x AveMariaRAT)
Reporter malwarelabnet
Tags:exe FormBook ModiLoader

Intelligence


File Origin
# of uploads :
2
# of downloads :
257
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
Cogigqkbkuvzlh.exe
Verdict:
Malicious activity
Analysis date:
2022-11-21 17:52:09 UTC
Tags:
installer formbook trojan stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Sending a custom TCP request
Creating a file
Running batch commands
Creating a process with a hidden window
Creating a process from a recently created file
DNS request
Launching a process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive keylogger overlay
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook
Detection:
malicious
Classification:
evad.troj
Score:
96 / 100
Signature
Allocates memory in foreign processes
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for submitted file
Suspicious powershell command line found
Writes to foreign memory regions
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 751075 Sample: Cogigqkbkuvzlh.exe Startdate: 21/11/2022 Architecture: WINDOWS Score: 96 46 Malicious sample detected (through community Yara rule) 2->46 48 Multi AV Scanner detection for submitted file 2->48 50 Yara detected FormBook 2->50 52 C2 URLs / IPs found in malware configuration 2->52 9 Cogigqkbkuvzlh.exe 1 6 2->9         started        process3 file4 36 C:\Users\Public\Libraries\png.ps1, ASCII 9->36 dropped 38 C:\Users\Public\Libraries\Cogigqkb.exe, PE32 9->38 dropped 54 Writes to foreign memory regions 9->54 56 Allocates memory in foreign processes 9->56 58 Creates a thread in another existing process (thread injection) 9->58 60 Injects a PE file into a foreign processes 9->60 13 cmd.exe 1 9->13         started        16 colorcpl.exe 2 9->16         started        signatures5 process6 signatures7 62 Suspicious powershell command line found 13->62 64 Bypasses PowerShell execution policy 13->64 18 powershell.exe 15 15 13->18         started        22 conhost.exe 13->22         started        66 Maps a DLL or memory area into another process 16->66 24 explorer.exe 16->24 injected process8 dnsIp9 40 qmyifq.ph.files.1drv.com 18->40 42 ph-files.fe.1drv.com 18->42 44 onedrive.live.com 18->44 34 C:\Users\Public\Libraries\png, data 18->34 dropped 26 Cogigqkb.exe 24->26         started        28 Cogigqkb.exe 24->28         started        file10 process11 process12 30 colorcpl.exe 26->30         started        32 colorcpl.exe 28->32         started       
Threat name:
Win32.Trojan.Injuke
Status:
Malicious
First seen:
2022-11-21 07:54:02 UTC
File Type:
PE (Exe)
Extracted files:
97
AV detection:
19 of 26 (73.08%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
formbook
Result
Malware family:
modiloader
Score:
  10/10
Tags:
family:formbook family:modiloader campaign:t3qw persistence rat spyware stealer trojan
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Reads user/profile data of web browsers
Blocklisted process makes network request
ModiLoader Second Stage
Formbook
ModiLoader, DBatLoader
Malware Config
Dropper Extraction:
https://onedrive.live.com/download?cid=E0CF7F9E6AAF27EF&resid=E0CF7F9E6AAF27EF%21807&authkey=AN9tFqxmcBL4hc0
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments