MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 423bfc26148d97985680739d2b43311d7f234680c244b8af60c224b3d3719857. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ModiLoader


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 423bfc26148d97985680739d2b43311d7f234680c244b8af60c224b3d3719857
SHA3-384 hash: e769810291b132dd06247fac8035656601b72951768cefcc81a0ba48d42d92734a7446bde4d1716922e35455ec33da28
SHA1 hash: 8df61e5bb6d16d3dd890826dc10e4f353e621742
MD5 hash: 71f242787c36a22b28507654d25b4f7e
humanhash: double-london-asparagus-hamper
File name:71f242787c36a22b28507654d25b4f7e.exe
Download: download sample
Signature ModiLoader
File size:965'120 bytes
First seen:2020-10-08 17:50:45 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f918ce4c02b222f66cc7aa2c3be8a168 (4 x ModiLoader)
ssdeep 12288:vKbIaBg0N87tcWa4WGEb7OVPso/BZm5gCiOsHMNTr3bJEYOcg+L:vIG97KZGOsKOMh3bJ1
Threatray 9 similar samples on MalwareBazaar
TLSH C8256D22A1D14C33C5F31A789D1BD398992EBD213D3AA9452BF22D4C7F35261793E293
Reporter abuse_ch
Tags:exe ModiLoader

Intelligence


File Origin
# of uploads :
1
# of downloads :
117
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
DNS request
Connection attempt
Launching the default Windows debugger (dwwin.exe)
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
68 / 100
Signature
Antivirus detection for URL or domain
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-10-08 17:52:08 UTC
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Unpacked files
SH256 hash:
423bfc26148d97985680739d2b43311d7f234680c244b8af60c224b3d3719857
MD5 hash:
71f242787c36a22b28507654d25b4f7e
SHA1 hash:
8df61e5bb6d16d3dd890826dc10e4f353e621742
Detections:
win_dbatloader_auto
SH256 hash:
8d01c3cf15ac1b585c4348f4ca1b7ae7d3a0128b4361bfb99663ef7b76d120c3
MD5 hash:
ba0f1a3fcab73d428d0ae20abbdad046
SHA1 hash:
076f0219e3322875595a1e7c5857162f4155e375
Detections:
win_dbatloader_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_dbatloader_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ModiLoader

Executable exe 423bfc26148d97985680739d2b43311d7f234680c244b8af60c224b3d3719857

(this sample)

  
Delivery method
Distributed via web download

Comments