MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0f2de8eba0953c020f80d8558336b129f778c7a1296714f7b132115b23ae0d69. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ModiLoader


Vendor detections: 13


Intelligence 13 IOCs YARA 5 File information Comments

SHA256 hash: 0f2de8eba0953c020f80d8558336b129f778c7a1296714f7b132115b23ae0d69
SHA3-384 hash: 818f7b11884a18678c6a82479861743b2aeeb6b043bb85984ae5177a92f5e0de2144c6f289c3ab010cda016d18f1bd79
SHA1 hash: 650e0a9802b3b89c2407f81dfa9c080e0e8937cd
MD5 hash: 76294170b910d6db59c1d24aea5c0121
humanhash: colorado-dakota-fillet-cardinal
File name:IMAGEDDOC0559DOC030273YALUMINUMPROFIL3554EQUANTITIES9.exe
Download: download sample
Signature ModiLoader
File size:930'304 bytes
First seen:2023-01-13 14:22:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4c4d584f7ca9b983483775797a8eb220 (1 x AveMariaRAT, 1 x RemcosRAT, 1 x ModiLoader)
ssdeep 12288:s4wdAWeD2sm2IQrzSyVSdndweMbYWZ0QomdcKF4x8oazsAyNBt0KHem:tYAhs2NrzSyVSdn5wYW+GOQ0czOt
TLSH T145158D42B2518833D2632D748D4F56BCA8787E192A68998D3EF13F5C7F76310252D2BE
TrID 53.4% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
16.8% (.SCR) Windows screen saver (13097/50/3)
13.5% (.EXE) Win64 Executable (generic) (10523/12/4)
5.7% (.EXE) Win32 Executable (generic) (4505/5/1)
2.6% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon 22b6235d55239aa6 (6 x ModiLoader, 2 x AveMariaRAT, 1 x RemcosRAT)
Reporter Anonymous
Tags:exe ModiLoader

Intelligence


File Origin
# of uploads :
1
# of downloads :
174
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
IMAGEDDOC0559DOC030273YALUMINUMPROFIL3554EQUANTITIES9.exe
Verdict:
Malicious activity
Analysis date:
2023-01-13 14:24:51 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
DNS request
Connecting to a non-recommended domain
Sending a custom TCP request
Creating a file
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching a process
Creating a process from a recently created file
Using the Windows Management Instrumentation requests
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckScreenResolution
CheckCmdLine
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
80%
Tags:
keylogger packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Remcos, DBatLoader
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Detected unpacking (creates a PE file in dynamic memory)
DLL side loading technique detected
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with a suspicious file extension
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suspicious powershell command line found
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected DBatLoader
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 783874 Sample: IMAGEDDOC0559DOC030273YALUM... Startdate: 13/01/2023 Architecture: WINDOWS Score: 100 66 www.supremeswitchgear.com 2->66 72 Malicious sample detected (through community Yara rule) 2->72 74 Antivirus detection for URL or domain 2->74 76 Multi AV Scanner detection for dropped file 2->76 78 7 other signatures 2->78 11 IMAGEDDOC0559DOC030273YALUMINUMPROFIL3554EQUANTITIES9.exe 1 24 2->11         started        16 Ndwrbpwy.exe 2->16         started        18 Ndwrbpwy.exe 2->18         started        signatures3 process4 dnsIp5 70 strassenburgpharma.biz 85.187.132.177, 443, 49701 A2HOSTINGUS United States 11->70 54 C:\Users\Public\Libraries\ywpbrwdN.pif, PE32 11->54 dropped 56 C:\Users\Public\Libraries\netutils.dll, PE32+ 11->56 dropped 58 C:\Users\Public\Libraries\easinvoker.exe, PE32+ 11->58 dropped 60 2 other malicious files 11->60 dropped 94 Drops PE files with a suspicious file extension 11->94 96 Writes to foreign memory regions 11->96 98 Allocates memory in foreign processes 11->98 20 cmd.exe 3 11->20         started        23 ywpbrwdN.pif 11->23         started        100 Multi AV Scanner detection for dropped file 16->100 102 Machine Learning detection for dropped file 16->102 104 Creates a thread in another existing process (thread injection) 16->104 26 ywpbrwdN.pif 16->26         started        106 Injects a PE file into a foreign processes 18->106 28 ywpbrwdN.pif 18->28         started        file6 signatures7 process8 dnsIp9 80 Uses ping.exe to sleep 20->80 82 Drops executables to the windows directory (C:\Windows) and starts them 20->82 84 Uses ping.exe to check the status of other devices and networks 20->84 30 easinvoker.exe 20->30         started        32 PING.EXE 1 20->32         started        35 xcopy.exe 2 20->35         started        38 6 other processes 20->38 68 www.supremeswitchgear.com 91.192.100.23, 2404, 49702, 49703 AS-SOFTPLUSCH Switzerland 23->68 86 Detected unpacking (creates a PE file in dynamic memory) 23->86 signatures10 process11 dnsIp12 40 cmd.exe 1 30->40         started        62 127.0.0.1 unknown unknown 32->62 64 192.168.2.1 unknown unknown 32->64 50 C:\Windows \System32\easinvoker.exe, PE32+ 35->50 dropped 52 C:\Windows \System32\netutils.dll, PE32+ 38->52 dropped file13 process14 signatures15 88 Suspicious powershell command line found 40->88 90 Adds a directory exclusion to Windows Defender 40->90 43 powershell.exe 23 40->43         started        46 conhost.exe 40->46         started        process16 signatures17 92 DLL side loading technique detected 43->92 48 conhost.exe 43->48         started        process18
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2023-01-10 15:42:46 UTC
File Type:
PE (Exe)
Extracted files:
45
AV detection:
27 of 38 (71.05%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:modiloader family:remcos botnet:suprem-switch persistence rat trojan
Behaviour
Enumerates system info in registry
Modifies system certificate store
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
ModiLoader Second Stage
ModiLoader, DBatLoader
Remcos
Malware Config
C2 Extraction:
www.supremeswitchgear.com:2404
Unpacked files
SH256 hash:
17bac612c9b6cf52b198ee1eb70003c8f86eeefe21305f3c63858bb77e2c322c
MD5 hash:
7b72abb55df82ba832e2819ebe7cbf45
SHA1 hash:
2db357f40c6816cf1386bf248fb338b203ffb3dc
Detections:
win_dbatloader_g1
Parent samples :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 hash:
0f2de8eba0953c020f80d8558336b129f778c7a1296714f7b132115b23ae0d69
MD5 hash:
76294170b910d6db59c1d24aea5c0121
SHA1 hash:
650e0a9802b3b89c2407f81dfa9c080e0e8937cd
Detections:
DbatLoaderStage1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:QbotStuff
Author:anonymous
Rule name:Typical_Malware_String_Transforms
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:Typical_Malware_String_Transforms_RID3473
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:yara_template

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

ModiLoader

Executable exe 0f2de8eba0953c020f80d8558336b129f778c7a1296714f7b132115b23ae0d69

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments