MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3fc5fe06474624df2032970d6c877080a12fdbd0b35f53622e11eb8788ed6c4a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ModiLoader


Vendor detections: 15


Intelligence 15 IOCs YARA 5 File information Comments

SHA256 hash: 3fc5fe06474624df2032970d6c877080a12fdbd0b35f53622e11eb8788ed6c4a
SHA3-384 hash: 1accedd1e67213672338577b1edda4cadfc84ee2e9478ac4a58a30d69bad1d5f9124167d5291270230dbdcd092aba546
SHA1 hash: 7aae6ada2da3a77ab9bcce228f69aada9d537865
MD5 hash: a930377177f54ebf1dcdbec559df9921
humanhash: wisconsin-moon-hamper-bacon
File name:Ordine Acquisto n. 1000052006_5870078070.exe
Download: download sample
Signature ModiLoader
File size:719'360 bytes
First seen:2023-02-03 16:49:54 UTC
Last seen:2023-02-03 18:39:28 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c27a057e1266983bd5bb82ac08c499af (2 x ModiLoader)
ssdeep 12288:sL/ZNrRZBps9ttZ8DL2QXcGEMTD+aGgFZfPvfofHQsr0Sa:C3TBS9TZ8DLUVMGrGZfPvxu
Threatray 2'575 similar samples on MalwareBazaar
TLSH T167E4BF36A2D11937CD0D667C5C77E7A8692ABD323D345487BBE92D5C0F38290783A1A3
TrID 26.5% (.EXE) Win32 Executable Delphi generic (14182/79/4)
24.5% (.SCR) Windows screen saver (13097/50/3)
19.7% (.EXE) Win64 Executable (generic) (10523/12/4)
8.4% (.EXE) Win32 Executable (generic) (4505/5/1)
5.6% (.MZP) WinArchiver Mountable compressed Archive (3000/1)
File icon (PE):PE icon
dhash icon 79d0b2b695b6b2b0 (3 x ModiLoader)
Reporter 0xToxin
Tags:exe ModiLoader

Intelligence


File Origin
# of uploads :
2
# of downloads :
190
Origin country :
IL IL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
Ordine Acquisto n. 1000052006_5870078070.exe
Verdict:
Malicious activity
Analysis date:
2023-02-03 16:55:35 UTC
Tags:
rat remcos keylogger

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file
Creating a process with a hidden window
Searching for the window
Enabling the 'hidden' option for recently created files
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckScreenResolution
CheckCmdLine
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
80%
Tags:
keylogger
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DBatLoader
Detection:
malicious
Classification:
troj
Score:
64 / 100
Signature
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected DBatLoader
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Remcos
Status:
Malicious
First seen:
2023-02-03 16:50:09 UTC
File Type:
PE (Exe)
Extracted files:
26
AV detection:
13 of 26 (50.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:modiloader family:remcos botnet:crypted persistence rat trojan
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Adds Run key to start application
ModiLoader Second Stage
ModiLoader, DBatLoader
Remcos
Malware Config
C2 Extraction:
20.38.32.202:2347
Unpacked files
SH256 hash:
17bac612c9b6cf52b198ee1eb70003c8f86eeefe21305f3c63858bb77e2c322c
MD5 hash:
7b72abb55df82ba832e2819ebe7cbf45
SHA1 hash:
2db357f40c6816cf1386bf248fb338b203ffb3dc
Detections:
win_dbatloader_g1
Parent samples :
6cc55a2e242baca97ac93ff859f4da04a9cbdeab28c3c69cef1806e87538feff
b72a8753d475c079cec084dc32cf8addec72b670d4cd094f67900d73781cace1
8bcf46ad691c82dc43513e12486bd798277cc7a4bd14de0b7c829e4e3ad2f730
16a3f220167bcdefd947617ea5f392677706f4d2a051bb03d0072bfdd42ac61b
50a13f6bced0bda92a35b13106f74959e15a48f47d18b04bc49ee95c82482cf7
35ac0593c5deea7885634a73e272e4bc177670c11a5b6bde6208abe4f4da3e8f
72a32e559653c3ef0b9f2c2065707850b24225f77dd9ec4dd3ebfffed43002fb
41cdb9b685b9507c22d4e44394e835fe9c6a7fb4f3e82923125d7431098b2f2b
b7285db14a569eccf6e5cca5416478153c38b9b7931f0bdea403901c3632cbc9
677655bbdf0459c53866f748f516e959a53c5843c2ec03f6c32d8210e7bf32cd
0f2de8eba0953c020f80d8558336b129f778c7a1296714f7b132115b23ae0d69
8698f02ff192f743528ca13ac53580c8495237f8d4be7d22eabf71d0f1a89468
4b382c5497bb61b9cc4189101e9595a031f37db9fa712b61cdc4a60f59bff8b4
7f354681e9ec602aef4dcdedfc3eb05a8f1a777b3691ae4d9d58e78240d49fe8
c71d80598f7d508be65e817fccefce6868b2a49efa99745f9a9a0d7a5bb68937
a108743bb80883049341b1383c477c97e0792cb40e0b15fcc4fa106f4d6aa5cc
6c0a67f2ab277962eec22ba75349ccfdf630eb3375b930a2fb852c932abce8e6
5e4a76f6e138e48915a6e38f071ca4e56f081cacadf102441bc188531a90ca1b
f7dfbc65446f96df449d3697012ea5b4c7925f4e2ff18c62481a1df722668c02
74e4c00d0f97715f60a4d78ee945ce8cc33686a85a82c4a0a48e3fb02c00e1e9
7a91a1cbaa20e78c0e6814b51ed7d239074c95dd348159817e16606a6a04f344
2e2a209e33d4b08ade19f874fab2aa15cf0bf2fb52fc002dd51c29b5f6a706a6
18951e369039dce6c21dcbf08f39da6d5dcc2bb23b90a0e13a3960f1de22288d
fd252e29ab84fc92e2084a5b06e85015d3216c0dd8e1d972972b899cc6ae1200
86eb0c65dc84614a458b9d0c095f10b87a5254ab1b1fd82168222d21a0320382
040a34e5884c29dd12452d342e344fe0d40f8dc1ea161d93c2a6c35b0a7da08b
2a53c1ef3fae150a0af2ec37f05a376d69cee7e56472ea1ec5fc1f8591f953a6
bc4567c45b05545162635889f7e50c26e610d3420cbd8d26401d430423d2e408
c266fa606a35b4ede65ae441e448dfcbf63b7a4e52091be0a6dc013b3e93c1f8
6f898510dabd717ad5b9a0057dc3a2e89d69a0fe8ffb5b8c50183e767bfee34f
f8cef01635333a94989c04697ddbff764081408e98a8f3203d0242b9c5b02408
e11e4728a96017107ba948c2b4653b96a2a633587aa1bd55b3d94c1d613b4ca4
bf143e643c42cd50ed2f712b9d1ee7996a27097ec9ffcbd52d914d643ac5151d
8aa2c54c1258e329b48d9ec31b3b8872440fa4216d23887ea8e8b7d66ae2f94f
23dc5d937451c57dc7137a2c84ff7763822b5bf627fbd8ab6b5305e4f0a0bb13
0ac31dec394cf07f302cb335061463e1358d769e0c01dfebea99ea38a04c1c84
f5f0160004ef74541cf1e83e4ed059e7f31bb162d779dc25d2114afab0c2c12f
1c66e9e00ba7adb9eb22363ff146d7c48875bf81b180c0e9ca6055f470d47424
d64087bb6c3f3db707e9728a3800ad308ea6ce7e4b33a4dae2ee15101df4e134
bc5e5b32cee20470d93b3152c3cb5faeee1434a11e07b5ac5efaa76fe1221034
9b7289ad08319ae1f731f988d955b06206b64cc7864f9af457a9fa0049a9021c
f89bdf26235faffcde237bebb15da55250f780d07a87a4304651a2e6b7e7e45a
3fc5fe06474624df2032970d6c877080a12fdbd0b35f53622e11eb8788ed6c4a
02033ee5f18dc5c14cca3e808111693ff1b41d8d705268ae55e86251fe6bcc8b
5454c9a4283d8a9ab17f32dc47e5bb60cd8d4a56d678e2e4c4f3001faa833fee
7e82cf496170e81178aa01bb117531aaf096b2ee9797e5d82e6e141ad550c0ef
9846c8ffd0aec6ff3c8b8db350032e4d9586ac6aa22b06944672c837d3bbcf28
e62a8dd12a0fe7876f858f80bfc1e9658f52f4594d7194ecc6dd656cd715b9d4
221784974f49f2b54c90c63ce6cf9550d94b15c3442c29c959300dbbf5b91f61
525d58527438fd6f9e3e6a98e6fab50faeef68a92d067a2caa53cbb34b2100cd
c3590c9943ef8ebc4c4b428dd8d5ca97e7855b4a86ef8db6913316d7711ea8a3
SH256 hash:
3fc5fe06474624df2032970d6c877080a12fdbd0b35f53622e11eb8788ed6c4a
MD5 hash:
a930377177f54ebf1dcdbec559df9921
SHA1 hash:
7aae6ada2da3a77ab9bcce228f69aada9d537865
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CMD_Ping_Localhost
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Typical_Malware_String_Transforms
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:Typical_Malware_String_Transforms_RID3473
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments