MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 19a73389eedc939c7060dda1dba9861db19f238a9da6e127d9674f72519478ef. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ModiLoader


Vendor detections: 6


Intelligence 6 IOCs YARA 1 File information Comments

SHA256 hash: 19a73389eedc939c7060dda1dba9861db19f238a9da6e127d9674f72519478ef
SHA3-384 hash: 0968b8de805bb4c990c94e1a6f58e62323c0c0013bd775f76ec80054805894dc562cfcd34ff93c237e510ac118c2b81f
SHA1 hash: 54d8b708a7a1d638868de5b2495d022c58473b94
MD5 hash: 783df5d35ac43ec787df3b0448f46e38
humanhash: echo-maryland-lion-speaker
File name:PI209174.exe
Download: download sample
Signature ModiLoader
File size:1'037'216 bytes
First seen:2020-10-22 07:08:11 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b370bd9acb33b65a37dff94bd60f0a01 (10 x ModiLoader, 2 x AveMariaRAT, 2 x Loki)
ssdeep 12288:pfbnamhHbXW763V8d8OAqUo3priVlP3lVJN2wNkmRPxkcIhlNweV+8YZqckawUNs:pf75m8OWo0l/iOk4PHIhlluYyPju
Threatray 415 similar samples on MalwareBazaar
TLSH FA258E12B7908436C1761A3DCE9FA7AC5D25FE402E24688B3BFD3D8D6F752812439297
Reporter abuse_ch
Tags:exe ModiLoader


Avatar
abuse_ch
Malspam distributing ModiLoader:

HELO: rdns0.hyterm.xyz
Sending IP: 134.209.44.46
From: AL MIRAGE LLC. (RAK)<office@teleaurd.xyz>
Reply-To: <medpartstopcon.sg@gmail.com>
Subject: RE: RE: RE: PAYMENT
Attachment: Swift Copy.7z (contains "PI209174.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
72
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
DNS request
Sending a custom TCP request
Creating a file
Launching a process
Unauthorized injection to a recently created process
Running batch commands
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Deleting a recently created file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.adwa.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the hosts file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Writes to foreign memory regions
Yara detected AgentTesla
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 302555 Sample: PI209174.exe Startdate: 22/10/2020 Architecture: WINDOWS Score: 100 47 Multi AV Scanner detection for submitted file 2->47 49 Yara detected AgentTesla 2->49 51 Machine Learning detection for sample 2->51 8 PI209174.exe 1 15 2->8         started        13 Odoadrv.exe 13 2->13         started        15 Odoadrv.exe 13 2->15         started        process3 dnsIp4 39 cdn.discordapp.com 162.159.134.233, 443, 49728 CLOUDFLARENETUS United States 8->39 41 discord.com 162.159.137.232, 443, 49726, 49741 CLOUDFLARENETUS United States 8->41 37 C:\Users\user\AppData\Local\...\Odoadrv.exe, PE32 8->37 dropped 55 Detected unpacking (changes PE section rights) 8->55 57 Detected unpacking (overwrites its own PE header) 8->57 59 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 8->59 69 3 other signatures 8->69 17 PI209174.exe 2 8->17         started        21 notepad.exe 4 8->21         started        43 162.159.129.233, 443, 49742 CLOUDFLARENETUS United States 13->43 61 Multi AV Scanner detection for dropped file 13->61 63 Machine Learning detection for dropped file 13->63 65 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 13->65 23 Odoadrv.exe 2 13->23         started        45 162.159.133.233, 443, 49745 CLOUDFLARENETUS United States 15->45 67 Injects a PE file into a foreign processes 15->67 25 Odoadrv.exe 15->25         started        file5 signatures6 process7 file8 35 C:\Windows\System32\drivers\etc\hosts, ASCII 17->35 dropped 53 Modifies the hosts file 17->53 27 cmd.exe 1 21->27         started        29 cmd.exe 1 21->29         started        signatures9 process10 process11 31 conhost.exe 27->31         started        33 conhost.exe 29->33         started       
Threat name:
Win32.Trojan.Jacard
Status:
Malicious
First seen:
2020-10-22 05:47:13 UTC
AV detection:
10 of 48 (20.83%)
Threat level:
  5/5
Result
Malware family:
modiloader
Score:
  10/10
Tags:
trojan family:modiloader
Behaviour
Modifies system certificate store
Suspicious use of WriteProcessMemory
ModiLoader First Stage
ModiLoader Second Stage
ModiLoader, DBatLoader
Unpacked files
SH256 hash:
19a73389eedc939c7060dda1dba9861db19f238a9da6e127d9674f72519478ef
MD5 hash:
783df5d35ac43ec787df3b0448f46e38
SHA1 hash:
54d8b708a7a1d638868de5b2495d022c58473b94
SH256 hash:
163d82e5e6b84296c3d9f260d8b41cfdd74f520c1235788283a86e6b6584a751
MD5 hash:
7e2c44b61fccd7092df38cc22d04fa81
SHA1 hash:
f4dc75d758540ae19068e46b0ec412f14f742c8c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Choice_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

ModiLoader

Executable exe 19a73389eedc939c7060dda1dba9861db19f238a9da6e127d9674f72519478ef

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments