MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 357ae03eb446bda1838949465952c7f02df92790e38c321573e6385ea83a1c64. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
ModiLoader
Vendor detections: 12
| SHA256 hash: | 357ae03eb446bda1838949465952c7f02df92790e38c321573e6385ea83a1c64 |
|---|---|
| SHA3-384 hash: | bf9e213c5874d41dac06bcd558461a5ff0fd71afa802e8b4daf9b7937a8815c19fd716277ca184f00941a5359c541d9b |
| SHA1 hash: | 27e67c5928d3ce3aec647c6950181101e3fa1573 |
| MD5 hash: | 7f572fb7d6f371a4d1cefe8ed399931a |
| humanhash: | magazine-echo-comet-bluebird |
| File name: | DHL AWB shipping document 3452778287,pdf.exe |
| Download: | download sample |
| Signature | ModiLoader |
| File size: | 957'952 bytes |
| First seen: | 2022-09-01 10:24:25 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | e44b1ce3d13e55963ede0f334a1c0840 (5 x ModiLoader, 2 x Formbook) |
| ssdeep | 24576:J6K2h1iVrItFQWGKN+NXN40JIyLrFHDvk:J6K286n+NXmWb1j |
| TLSH | T1EC15BFF6B2E08A33C4231A7DDD1753A8DD29BA511E14755F7BE1168C8FB8280383B967 |
| TrID | 65.6% (.EXE) Win32 Executable Borland Delphi 7 (664796/42/58) 25.9% (.EXE) Win32 Executable Borland Delphi 6 (262638/61) 4.2% (.EXE) InstallShield setup (43053/19/16) 1.3% (.EXE) Win32 Executable Delphi generic (14182/79/4) 1.2% (.SCR) Windows screen saver (13101/52/3) |
| File icon (PE): | |
| dhash icon | ecf4b2b2b2d4d4dc (6 x ModiLoader, 2 x Formbook, 2 x RemcosRAT) |
| Reporter | |
| Tags: | DHL exe ModiLoader |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | ach_RemcosRAT |
|---|---|
| Author: | abuse.ch |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer |
|---|---|
| Author: | ditekSHen |
| Description: | detects Windows exceutables potentially bypassing UAC using eventvwr.exe |
| Rule name: | malware_Remcos_strings |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Remcos in memory |
| Rule name: | meth_get_eip |
|---|---|
| Author: | Willi Ballenthin |
| Rule name: | Parallax |
|---|---|
| Author: | @bartblaze |
| Description: | Identifies Parallax RAT. |
| Rule name: | Remcos |
|---|---|
| Author: | kevoreilly |
| Description: | Remcos Payload |
| Rule name: | remcos_rat |
|---|---|
| Author: | jeFF0Falltrades |
| Rule name: | REMCOS_RAT_variants |
|---|
| Rule name: | SUSP_VBS_Wscript_Shell |
|---|---|
| Author: | SECUINFRA Falcon Team |
| Description: | Detects the definition of 'Wscript.Shell' which is often used by Malware, FPs are possible and commmon |
| Rule name: | win_remcos_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.remcos. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.