MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1ade8e9c697c91b31ad76389a10e95c229eb05359a1dd70358be045199ff77a4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ModiLoader


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: 1ade8e9c697c91b31ad76389a10e95c229eb05359a1dd70358be045199ff77a4
SHA3-384 hash: 4625baeb64de67f2aa83acf394b3b3c458ef5d43d69fdbf3d03aad4c8025dea9b85c452818bf2c9e4d8a89a196d5cea4
SHA1 hash: 0d8e351b416d1c31c5eced45ec75ccac9dbfc1ad
MD5 hash: be29c05ef14711fe1912e7bf66663078
humanhash: triple-three-october-apart
File name:be29c05ef14711fe1912e7bf66663078.exe
Download: download sample
Signature ModiLoader
File size:749'760 bytes
First seen:2020-12-16 08:12:32 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 0fe9a21f0eaacd42b3f42bdd72bc37cf (5 x ModiLoader)
ssdeep 12288:fsaXPocWk0vDvWHuHxJ+nEDZZE8NVbKCJU1sWaa0zZbzro161111PGRajT:fffo/vDvWHCxIEDsCdNJ6161111eMH
Threatray 3'283 similar samples on MalwareBazaar
TLSH 6AF4AE22A3915837C0771D789C1B96A4DC3BBE113D28A95AEBF51F8C5F342613A371A3
Reporter abuse_ch
Tags:exe ModiLoader

Intelligence


File Origin
# of uploads :
1
# of downloads :
151
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
be29c05ef14711fe1912e7bf66663078.exe
Verdict:
No threats detected
Analysis date:
2020-12-16 08:15:06 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
DNS request
Sending a custom TCP request
Creating a file
Launching a process
Sending an HTTP GET request
Unauthorized injection to a recently created process by context flags manipulation
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-12-16 08:13:05 UTC
AV detection:
12 of 48 (25.00%)
Threat level:
  5/5
Result
Malware family:
xloader
Score:
  10/10
Tags:
family:formbook family:modiloader family:xloader loader persistence rat spyware stealer trojan
Behaviour
Enumerates system info in registry
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of UnmapMainImage
Suspicious use of SetThreadContext
Adds Run key to start application
Adds policy Run key to start application
Xloader Payload
Formbook
ModiLoader, DBatLoader
Xloader
Malware Config
C2 Extraction:
http://www.herbmedia.net/csv8/
Unpacked files
SH256 hash:
5cff498e5e66ccb6703a325472712799e82f88ef7766cb2443c65e5b2939e8d0
MD5 hash:
79b629f5b501288aa2a44119ceeeb5f4
SHA1 hash:
b68424fd8b180239d9357c76df8a83b5933305cc
SH256 hash:
1ade8e9c697c91b31ad76389a10e95c229eb05359a1dd70358be045199ff77a4
MD5 hash:
be29c05ef14711fe1912e7bf66663078
SHA1 hash:
0d8e351b416d1c31c5eced45ec75ccac9dbfc1ad
Detections:
win_dbatloader_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_dbatloader_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ModiLoader

Executable exe 1ade8e9c697c91b31ad76389a10e95c229eb05359a1dd70358be045199ff77a4

(this sample)

  
Delivery method
Distributed via web download

Comments