MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 18d3b2043c0bbcb8af1d740837e13dbfbf803156a205df76ed824625d57158e4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
ModiLoader
Vendor detections: 13
| SHA256 hash: | 18d3b2043c0bbcb8af1d740837e13dbfbf803156a205df76ed824625d57158e4 |
|---|---|
| SHA3-384 hash: | 68b5714caa5ffaaf452c8621e4150bcb33df301b1edcec355fa0bee032570e1d4bd94dcd58db4f7ed6c02b88fe885c48 |
| SHA1 hash: | b74940aae38d2f47c35cfe6ec3a271f0314d0454 |
| MD5 hash: | 2df6641dd76043f80aefd2395c8797c3 |
| humanhash: | foxtrot-nevada-green-berlin |
| File name: | Dospjela faktura.exe |
| Download: | download sample |
| Signature | ModiLoader |
| File size: | 958'464 bytes |
| First seen: | 2022-09-01 07:51:31 UTC |
| Last seen: | 2022-09-02 09:03:15 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | e44b1ce3d13e55963ede0f334a1c0840 (5 x ModiLoader, 2 x Formbook) |
| ssdeep | 24576:J6K2h1iVrItFQWGKN+NXN40JIyLrFHDvk:J6K286n+NXmWb1j |
| TLSH | T1FF159EF672F04A33D0631639D95763A8ED29BD511E11B94E3BE4298CCF78680343EA67 |
| TrID | 65.6% (.EXE) Win32 Executable Borland Delphi 7 (664796/42/58) 25.9% (.EXE) Win32 Executable Borland Delphi 6 (262638/61) 4.2% (.EXE) InstallShield setup (43053/19/16) 1.3% (.EXE) Win32 Executable Delphi generic (14182/79/4) 1.2% (.SCR) Windows screen saver (13101/52/3) |
| File icon (PE): | |
| dhash icon | ecf4b2b2b2d4d4dc (6 x ModiLoader, 2 x Formbook, 2 x RemcosRAT) |
| Reporter | |
| Tags: | exe ModiLoader |
Intelligence
File Origin
# of uploads :
3
# of downloads :
239
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Dospjela faktura.exe
Verdict:
Malicious activity
Analysis date:
2022-09-01 09:25:47 UTC
Tags:
installer
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file
Launching a process
Creating a process with a hidden window
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
evasive keylogger overlay
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Unknown
Result
Threat name:
DBatLoader, FormBook
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Creates a thread in another existing process (thread injection)
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Writes to foreign memory regions
Yara detected DBatLoader
Yara detected FormBook
Yara detected UAC Bypass using ComputerDefaults
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2022-09-01 00:45:33 UTC
File Type:
PE (Exe)
Extracted files:
52
AV detection:
22 of 26 (84.62%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
xloader
Score:
10/10
Tags:
family:modiloader family:xloader campaign:euv4 loader persistence rat trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Blocklisted process makes network request
ModiLoader Second Stage
Xloader payload
ModiLoader, DBatLoader
Xloader
Unpacked files
SH256 hash:
1522d5420017b1a441879eb3b82dc865cb51683e52eb4360350aa8863cc231f4
MD5 hash:
9677c1e5bda56255f94796b4d5e715d8
SHA1 hash:
99d81e250fe6df765208d861cdb8c59f13534ff0
Detections:
win_dbatloader_g1
Parent samples :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 hash:
18d3b2043c0bbcb8af1d740837e13dbfbf803156a205df76ed824625d57158e4
MD5 hash:
2df6641dd76043f80aefd2395c8797c3
SHA1 hash:
b74940aae38d2f47c35cfe6ec3a271f0314d0454
Malware family:
XLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.