MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1c66e9e00ba7adb9eb22363ff146d7c48875bf81b180c0e9ca6055f470d47424. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ModiLoader


Vendor detections: 14


Intelligence 14 IOCs YARA 4 File information Comments

SHA256 hash: 1c66e9e00ba7adb9eb22363ff146d7c48875bf81b180c0e9ca6055f470d47424
SHA3-384 hash: 74d57d200bf088095b9197761fd6fa63d8cdcae5adae99e0051dad2c05e3609bc0cb8b6c167eaaaa918f476acbb32681
SHA1 hash: 27742d3bb8211441064f9d34e365d43db9bf8f04
MD5 hash: e7bde03076e77878ff39aa89bc4c5e29
humanhash: snake-indigo-tennessee-zulu
File name:scan_2023748984785874774.exe
Download: download sample
Signature ModiLoader
File size:718'336 bytes
First seen:2023-01-30 09:04:13 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 5a1d07c71453f2216356e11a25273b2e (3 x ModiLoader, 1 x AveMariaRAT, 1 x RemcosRAT)
ssdeep 12288:Z1HbJXPhvoavMSPJ7Q7/S7sW/vCFovXe8TSfPt3C:3lXZAavMo7Q74sECFoGCe1
TLSH T153E48E53A7F1D837F01D29B6CD5B9AE86D2FBD601918B4063EF07E0C1E3A2813965297
TrID 26.5% (.EXE) Win32 Executable Delphi generic (14182/79/4)
24.5% (.SCR) Windows screen saver (13097/50/3)
19.7% (.EXE) Win64 Executable (generic) (10523/12/4)
8.4% (.EXE) Win32 Executable (generic) (4505/5/1)
5.6% (.MZP) WinArchiver Mountable compressed Archive (3000/1)
File icon (PE):PE icon
dhash icon 64e0d4c2d494d09c (3 x ModiLoader, 2 x RemcosRAT, 1 x AveMariaRAT)
Reporter adrian__luca
Tags:exe ModiLoader

Intelligence


File Origin
# of uploads :
1
# of downloads :
196
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
scan_2023748984785874774.exe
Verdict:
Malicious activity
Analysis date:
2023-01-30 09:18:28 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Creating a process from a recently created file
Searching for the window
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
DNS request
Sending a custom TCP request
Creating a file
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckScreenResolution
CheckCmdLine
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
67%
Tags:
keylogger
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Remcos, DBatLoader
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Detected unpacking (creates a PE file in dynamic memory)
DLL side loading technique detected
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with a suspicious file extension
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suspicious powershell command line found
Uses dynamic DNS services
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected DBatLoader
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 794149 Sample: scan_2023748984785874774.exe Startdate: 30/01/2023 Architecture: WINDOWS Score: 100 69 pacorem.duckdns.org 2->69 87 Malicious sample detected (through community Yara rule) 2->87 89 Antivirus detection for URL or domain 2->89 91 Multi AV Scanner detection for dropped file 2->91 93 6 other signatures 2->93 11 scan_2023748984785874774.exe 1 22 2->11         started        16 Gvnjfhly.exe 15 2->16         started        18 Gvnjfhly.exe 2->18         started        signatures3 process4 dnsIp5 73 onedrive.live.com 11->73 81 2 other IPs or domains 11->81 57 C:\Users\Public\Libraries\netutils.dll, PE32+ 11->57 dropped 59 C:\Users\Public\Libraries\easinvoker.exe, PE32+ 11->59 dropped 61 C:\Users\Public\Librariesbehaviorgraphvnjfhly.exe, PE32 11->61 dropped 63 C:\Users\...behaviorgraphvnjfhly.exe:Zone.Identifier, ASCII 11->63 dropped 109 Writes to foreign memory regions 11->109 111 Allocates memory in foreign processes 11->111 113 Creates a thread in another existing process (thread injection) 11->113 20 cmd.exe 3 11->20         started        23 ylhfjnvG.pif 11->23         started        75 l-0004.l-dc-msedge.net 13.107.43.13, 443, 49718, 49722 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 16->75 77 onedrive.live.com 16->77 83 2 other IPs or domains 16->83 65 C:\Users\Public\Libraries\ylhfjnvG.pif, PE32 16->65 dropped 115 Multi AV Scanner detection for dropped file 16->115 117 Drops PE files with a suspicious file extension 16->117 119 Injects a PE file into a foreign processes 16->119 25 ylhfjnvG.pif 16->25         started        79 onedrive.live.com 18->79 85 2 other IPs or domains 18->85 29 ylhfjnvG.pif 18->29         started        file6 signatures7 process8 dnsIp9 95 Uses ping.exe to sleep 20->95 97 Drops executables to the windows directory (C:\Windows) and starts them 20->97 99 Uses ping.exe to check the status of other devices and networks 20->99 31 easinvoker.exe 20->31         started        33 PING.EXE 1 20->33         started        36 xcopy.exe 2 20->36         started        39 6 other processes 20->39 71 pacorem.duckdns.org 194.5.98.245, 1377, 49720, 49721 DANILENKODE Netherlands 25->71 55 C:\ProgramData\remcos\logs.dat, data 25->55 dropped 101 Detected unpacking (creates a PE file in dynamic memory) 25->101 file10 signatures11 process12 dnsIp13 41 cmd.exe 1 31->41         started        67 127.0.0.1 unknown unknown 33->67 51 C:\Windows \System32\easinvoker.exe, PE32+ 36->51 dropped 53 C:\Windows \System32\netutils.dll, PE32+ 39->53 dropped file14 process15 signatures16 103 Suspicious powershell command line found 41->103 105 Adds a directory exclusion to Windows Defender 41->105 44 powershell.exe 22 41->44         started        47 conhost.exe 41->47         started        process17 signatures18 107 DLL side loading technique detected 44->107 49 conhost.exe 44->49         started        process19
Threat name:
Win32.Trojan.Leonem
Status:
Malicious
First seen:
2023-01-24 09:45:53 UTC
File Type:
PE (Exe)
Extracted files:
56
AV detection:
24 of 26 (92.31%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:modiloader family:remcos botnet:paco 2023 persistence rat trojan
Behaviour
Enumerates system info in registry
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
ModiLoader Second Stage
ModiLoader, DBatLoader
Remcos
Malware Config
C2 Extraction:
pacorem.duckdns.org:1377
Unpacked files
SH256 hash:
17bac612c9b6cf52b198ee1eb70003c8f86eeefe21305f3c63858bb77e2c322c
MD5 hash:
7b72abb55df82ba832e2819ebe7cbf45
SHA1 hash:
2db357f40c6816cf1386bf248fb338b203ffb3dc
Detections:
win_dbatloader_g1
Parent samples :
6cc55a2e242baca97ac93ff859f4da04a9cbdeab28c3c69cef1806e87538feff
b72a8753d475c079cec084dc32cf8addec72b670d4cd094f67900d73781cace1
8bcf46ad691c82dc43513e12486bd798277cc7a4bd14de0b7c829e4e3ad2f730
16a3f220167bcdefd947617ea5f392677706f4d2a051bb03d0072bfdd42ac61b
50a13f6bced0bda92a35b13106f74959e15a48f47d18b04bc49ee95c82482cf7
35ac0593c5deea7885634a73e272e4bc177670c11a5b6bde6208abe4f4da3e8f
72a32e559653c3ef0b9f2c2065707850b24225f77dd9ec4dd3ebfffed43002fb
41cdb9b685b9507c22d4e44394e835fe9c6a7fb4f3e82923125d7431098b2f2b
b7285db14a569eccf6e5cca5416478153c38b9b7931f0bdea403901c3632cbc9
677655bbdf0459c53866f748f516e959a53c5843c2ec03f6c32d8210e7bf32cd
0f2de8eba0953c020f80d8558336b129f778c7a1296714f7b132115b23ae0d69
8698f02ff192f743528ca13ac53580c8495237f8d4be7d22eabf71d0f1a89468
4b382c5497bb61b9cc4189101e9595a031f37db9fa712b61cdc4a60f59bff8b4
7f354681e9ec602aef4dcdedfc3eb05a8f1a777b3691ae4d9d58e78240d49fe8
c71d80598f7d508be65e817fccefce6868b2a49efa99745f9a9a0d7a5bb68937
a108743bb80883049341b1383c477c97e0792cb40e0b15fcc4fa106f4d6aa5cc
6c0a67f2ab277962eec22ba75349ccfdf630eb3375b930a2fb852c932abce8e6
5e4a76f6e138e48915a6e38f071ca4e56f081cacadf102441bc188531a90ca1b
f7dfbc65446f96df449d3697012ea5b4c7925f4e2ff18c62481a1df722668c02
74e4c00d0f97715f60a4d78ee945ce8cc33686a85a82c4a0a48e3fb02c00e1e9
7a91a1cbaa20e78c0e6814b51ed7d239074c95dd348159817e16606a6a04f344
2e2a209e33d4b08ade19f874fab2aa15cf0bf2fb52fc002dd51c29b5f6a706a6
18951e369039dce6c21dcbf08f39da6d5dcc2bb23b90a0e13a3960f1de22288d
fd252e29ab84fc92e2084a5b06e85015d3216c0dd8e1d972972b899cc6ae1200
86eb0c65dc84614a458b9d0c095f10b87a5254ab1b1fd82168222d21a0320382
040a34e5884c29dd12452d342e344fe0d40f8dc1ea161d93c2a6c35b0a7da08b
2a53c1ef3fae150a0af2ec37f05a376d69cee7e56472ea1ec5fc1f8591f953a6
bc4567c45b05545162635889f7e50c26e610d3420cbd8d26401d430423d2e408
c266fa606a35b4ede65ae441e448dfcbf63b7a4e52091be0a6dc013b3e93c1f8
6f898510dabd717ad5b9a0057dc3a2e89d69a0fe8ffb5b8c50183e767bfee34f
f8cef01635333a94989c04697ddbff764081408e98a8f3203d0242b9c5b02408
e11e4728a96017107ba948c2b4653b96a2a633587aa1bd55b3d94c1d613b4ca4
bf143e643c42cd50ed2f712b9d1ee7996a27097ec9ffcbd52d914d643ac5151d
8aa2c54c1258e329b48d9ec31b3b8872440fa4216d23887ea8e8b7d66ae2f94f
23dc5d937451c57dc7137a2c84ff7763822b5bf627fbd8ab6b5305e4f0a0bb13
0ac31dec394cf07f302cb335061463e1358d769e0c01dfebea99ea38a04c1c84
f5f0160004ef74541cf1e83e4ed059e7f31bb162d779dc25d2114afab0c2c12f
1c66e9e00ba7adb9eb22363ff146d7c48875bf81b180c0e9ca6055f470d47424
d64087bb6c3f3db707e9728a3800ad308ea6ce7e4b33a4dae2ee15101df4e134
bc5e5b32cee20470d93b3152c3cb5faeee1434a11e07b5ac5efaa76fe1221034
9b7289ad08319ae1f731f988d955b06206b64cc7864f9af457a9fa0049a9021c
f89bdf26235faffcde237bebb15da55250f780d07a87a4304651a2e6b7e7e45a
3fc5fe06474624df2032970d6c877080a12fdbd0b35f53622e11eb8788ed6c4a
02033ee5f18dc5c14cca3e808111693ff1b41d8d705268ae55e86251fe6bcc8b
5454c9a4283d8a9ab17f32dc47e5bb60cd8d4a56d678e2e4c4f3001faa833fee
7e82cf496170e81178aa01bb117531aaf096b2ee9797e5d82e6e141ad550c0ef
9846c8ffd0aec6ff3c8b8db350032e4d9586ac6aa22b06944672c837d3bbcf28
e62a8dd12a0fe7876f858f80bfc1e9658f52f4594d7194ecc6dd656cd715b9d4
221784974f49f2b54c90c63ce6cf9550d94b15c3442c29c959300dbbf5b91f61
525d58527438fd6f9e3e6a98e6fab50faeef68a92d067a2caa53cbb34b2100cd
c3590c9943ef8ebc4c4b428dd8d5ca97e7855b4a86ef8db6913316d7711ea8a3
SH256 hash:
1c66e9e00ba7adb9eb22363ff146d7c48875bf81b180c0e9ca6055f470d47424
MD5 hash:
e7bde03076e77878ff39aa89bc4c5e29
SHA1 hash:
27742d3bb8211441064f9d34e365d43db9bf8f04
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:aPLib_decompression
Author:@r3c0nst
Description:Detects aPLib decompression code often used in malware
Reference:https://ibsensoftware.com/files/aPLib-1.1.1.zip
Rule name:CMD_Ping_Localhost
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

ModiLoader

Executable exe 1c66e9e00ba7adb9eb22363ff146d7c48875bf81b180c0e9ca6055f470d47424

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments