MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 28920de5f1a16d20eb01e17bee84c2144eefa938bf0653e4165e3ff18b9244cc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ModiLoader


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments 1

SHA256 hash: 28920de5f1a16d20eb01e17bee84c2144eefa938bf0653e4165e3ff18b9244cc
SHA3-384 hash: dcc90abeeb2cd8f0d0aff0e3724ceceb5f191c98da485d84942881619cabf8e05135dc94452b1263f91b9b9a840cc38c
SHA1 hash: d70d61353e3ce850e6891623336ebdab931d5530
MD5 hash: 69b17d0f9389404a1228d310198b33e9
humanhash: freddie-social-emma-blossom
File name:69b17d0f9389404a1228d310198b33e9
Download: download sample
Signature ModiLoader
File size:3'067'920 bytes
First seen:2022-07-04 14:53:09 UTC
Last seen:2022-07-15 02:54:13 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash e0b1765e8b4f2995720881c16710f99b (1 x ModiLoader)
ssdeep 49152:ovU78mdvDXIV/nF2qR00PEqYuJu6odnepi4qGFbsel9ziUVbjikSN2i:oCvd7Yx3ECJ/odnEi4hbX9zimU7
Threatray 12'857 similar samples on MalwareBazaar
TLSH T18AE52271A5A00033C1F669768C4F896D242FBE202D68AD42BADA7F8D7F3F610791D197
TrID 29.1% (.EXE) Win64 Executable (generic) (10523/12/4)
27.6% (.EXE) DOS Borland compiled Executable (generic) (10000/1/2)
12.4% (.EXE) Win32 Executable (generic) (4505/5/1)
8.3% (.MZP) WinArchiver Mountable compressed Archive (3000/1)
5.7% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon cecacac8c8ead8b8 (1 x ModiLoader)
Reporter zbetcheckin
Tags:32 exe ModiLoader

Intelligence


File Origin
# of uploads :
3
# of downloads :
267
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for analyzing tools
Searching for the window
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Unauthorized injection to a recently created process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed virus wacatac
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Detected unpacking (creates a PE file in dynamic memory)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Snort IDS alert for network traffic
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade analysis by execution special instruction (VM detection)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 656764 Sample: NmMtwsUK5u Startdate: 04/07/2022 Architecture: WINDOWS Score: 100 58 Snort IDS alert for network traffic 2->58 60 Multi AV Scanner detection for domain / URL 2->60 62 Antivirus detection for URL or domain 2->62 64 3 other signatures 2->64 9 NmMtwsUK5u.exe 16 2->9         started        13 cellexprev.exe 2->13         started        process3 dnsIp4 44 l-0004.l-dc-msedge.net 13.107.43.13, 443, 49753, 49760 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 9->44 46 w92wvg.db.files.1drv.com 9->46 48 2 other IPs or domains 9->48 74 Detected unpacking (creates a PE file in dynamic memory) 9->74 76 Query firmware table information (likely to detect VMs) 9->76 78 Tries to detect sandboxes and other dynamic analysis tools (window names) 9->78 86 2 other signatures 9->86 15 NmMtwsUK5u.exe 27 9->15         started        80 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 13->80 82 Tries to evade analysis by execution special instruction (VM detection) 13->82 84 Hides threads from debuggers 13->84 signatures5 process6 dnsIp7 50 94.158.244.119, 49818, 80 MIVOCLOUDMD Moldova Republic of 15->50 52 77.91.102.57, 49775, 80 FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU Russian Federation 15->52 34 C:\Users\user\AppData\Roaming\8m6225A9.exe, PE32 15->34 dropped 36 C:\Users\user\AppData\...\vcruntime140.dll, PE32 15->36 dropped 38 C:\Users\user\AppData\LocalLow\sqlite3.dll, PE32 15->38 dropped 40 5 other files (none is malicious) 15->40 dropped 54 Tries to harvest and steal browser information (history, passwords, etc) 15->54 56 Tries to steal Crypto Currency Wallets 15->56 20 8m6225A9.exe 3 15->20         started        file8 signatures9 process10 file11 42 C:\Users\user\AppData\...\cellexprev.exe, PE32 20->42 dropped 66 Multi AV Scanner detection for dropped file 20->66 68 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 20->68 70 Query firmware table information (likely to detect VMs) 20->70 72 3 other signatures 20->72 24 schtasks.exe 1 20->24         started        26 schtasks.exe 1 20->26         started        28 WerFault.exe 23 9 20->28         started        signatures12 process13 process14 30 conhost.exe 24->30         started        32 conhost.exe 26->32         started       
Threat name:
Win32.Trojan.Delf
Status:
Malicious
First seen:
2022-07-04 11:38:27 UTC
File Type:
PE (Exe)
Extracted files:
41
AV detection:
20 of 26 (76.92%)
Threat level:
  5/5
Result
Malware family:
modiloader
Score:
  10/10
Tags:
family:modiloader evasion themida trojan
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks whether UAC is enabled
Checks BIOS information in registry
Themida packer
Identifies VirtualBox via ACPI registry values (likely anti-VM)
ModiLoader Second Stage
ModiLoader, DBatLoader
Unpacked files
SH256 hash:
0b4b7d7628499c9d0c62562dc64f22baf5390cd32f71e0317c259511ae85b5b6
MD5 hash:
d6e8fb9c9383709a7475144fbc74cb44
SHA1 hash:
3dc32f98eb13d725511b64924730132883ad3591
SH256 hash:
3a8b330aa37ad8510d1827004fe8571d7a5de8365dad2dd6febffd95ce38f42d
MD5 hash:
4427518317d9efadb876bc54b7db525f
SHA1 hash:
a4f482adbecdd11dc6c5a7bccc7946a78b780557
SH256 hash:
28920de5f1a16d20eb01e17bee84c2144eefa938bf0653e4165e3ff18b9244cc
MD5 hash:
69b17d0f9389404a1228d310198b33e9
SHA1 hash:
d70d61353e3ce850e6891623336ebdab931d5530
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ModiLoader

Executable exe 28920de5f1a16d20eb01e17bee84c2144eefa938bf0653e4165e3ff18b9244cc

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-07-04 14:53:14 UTC

url : hxxps://my.cloudme.com/v1/ws2/:portable2022/:Setup_49/Setup.exe