MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4f1e9fb055d2edf64a82cd342bb580f3f1a2f7a2351ac8a2cddc25120bb726ac. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ModiLoader


Vendor detections: 13


Intelligence 13 IOCs YARA 11 File information Comments

SHA256 hash: 4f1e9fb055d2edf64a82cd342bb580f3f1a2f7a2351ac8a2cddc25120bb726ac
SHA3-384 hash: 292c105abc9b0827a580b5ff5c960ea273883522dece23e4a1b5898dc83e193d297a8ccea6ba2c165c2fc53496fd2c94
SHA1 hash: 8d57e14cae8930ece06ec08ca3dcc12e59618114
MD5 hash: 8e98b3f01bd5da1f95682d7babb5a773
humanhash: twelve-tennis-fifteen-bacon
File name:Htfsyigeljjulk.exe
Download: download sample
Signature ModiLoader
File size:761'344 bytes
First seen:2023-08-14 06:34:18 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ea5ae0eb30ecb2270f4a40ff7bdfb891 (3 x ModiLoader)
ssdeep 12288:HHLE4rSOHgTxpMrC2zR4othaxEU+rxFVOt3FYe64QPIOhO1CYuhP:HrKOANKrCzaax4VuVNQIOhO1UhP
Threatray 3'514 similar samples on MalwareBazaar
TLSH T10DF4AF2BF3F070B3C5E2127C9C1697B4A82ABE212798A04A7BD73D5CDF355813929356
TrID 84.9% (.EXE) Win32 Executable Borland Delphi 6 (262638/61)
4.5% (.EXE) Win32 Executable Delphi generic (14182/79/4)
4.2% (.SCR) Windows screen saver (13097/50/3)
2.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.4% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 74e0c4d0d4d2d0d4 (3 x ModiLoader)
Reporter lowmal3
Tags:exe ModiLoader

Intelligence


File Origin
# of uploads :
1
# of downloads :
272
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Htfsyigeljjulk.exe
Verdict:
Malicious activity
Analysis date:
2023-08-14 06:35:01 UTC
Tags:
dbatloader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Running batch commands
Creating a process with a hidden window
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control greyware keylogger lolbin
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DBatLoader, FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
DLL side loading technique detected
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with a suspicious file extension
Found malware configuration
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected DBatLoader
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1290800 Sample: Htfsyigeljjulk.exe Startdate: 14/08/2023 Architecture: WINDOWS Score: 100 109 Snort IDS alert for network traffic 2->109 111 Found malware configuration 2->111 113 Malicious sample detected (through community Yara rule) 2->113 115 6 other signatures 2->115 11 Htfsyigeljjulk.exe 1 7 2->11         started        process3 dnsIp4 89 web.fe.1drv.com 11->89 91 onedrive.live.com 11->91 93 2 other IPs or domains 11->93 61 C:\Users\Public\Libraries\netutils.dll, PE32+ 11->61 dropped 63 C:\Users\Public\Libraries\easinvoker.exe, PE32+ 11->63 dropped 65 C:\Users\Public\Libraries\Tgmacggv.PIF, PE32 11->65 dropped 139 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 11->139 141 Drops PE files with a suspicious file extension 11->141 143 Maps a DLL or memory area into another process 11->143 145 Queues an APC in another process (thread injection) 11->145 16 Tgmacggv.PIF 11->16         started        20 cmd.exe 1 11->20         started        file5 signatures6 process7 dnsIp8 67 web.fe.1drv.com 16->67 69 onedrive.live.com 16->69 71 2 other IPs or domains 16->71 95 Multi AV Scanner detection for dropped file 16->95 97 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 16->97 99 Machine Learning detection for dropped file 16->99 101 Maps a DLL or memory area into another process 16->101 22 chkdsk.exe 16->22         started        26 Tgmacggv.PIF 16->26         started        103 Uses ping.exe to sleep 20->103 105 Drops executables to the windows directory (C:\Windows) and starts them 20->105 107 Uses ping.exe to check the status of other devices and networks 20->107 28 easinvoker.exe 20->28         started        30 PING.EXE 1 20->30         started        32 xcopy.exe 2 20->32         started        35 8 other processes 20->35 signatures9 process10 dnsIp11 79 www.miyekc.top 22->79 127 Tries to steal Mail credentials (via file / registry access) 22->127 129 Tries to harvest and steal browser information (history, passwords, etc) 22->129 131 Modifies the context of a thread in another process (thread injection) 22->131 133 DLL side loading technique detected 22->133 37 explorer.exe 22->37 injected 81 web.fe.1drv.com 26->81 83 onedrive.live.com 26->83 87 2 other IPs or domains 26->87 135 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 26->135 137 Maps a DLL or memory area into another process 26->137 41 raserver.exe 26->41         started        43 backgroundTaskHost.exe 26->43         started        45 cmd.exe 1 28->45         started        85 127.0.0.1 unknown unknown 30->85 57 C:\Windows \System32\easinvoker.exe, PE32+ 32->57 dropped 59 C:\Windows \System32\netutils.dll, PE32+ 35->59 dropped file12 signatures13 process14 dnsIp15 73 vls003vm08.hostmaster.sk 93.184.77.58, 49780, 80 VNET-ASSK Slovakia (SLOVAK Republic) 37->73 75 www.jones4deepriver.com 74.208.236.181, 49797, 49798, 49799 ONEANDONE-ASBrauerstrasse48DE United States 37->75 77 9 other IPs or domains 37->77 119 System process connects to network (likely due to code injection or exploit) 37->119 121 Performs DNS queries to domains with low reputation 37->121 123 DLL side loading technique detected 41->123 125 Adds a directory exclusion to Windows Defender 45->125 47 cmd.exe 1 45->47         started        50 conhost.exe 45->50         started        signatures16 process17 signatures18 147 Adds a directory exclusion to Windows Defender 47->147 52 powershell.exe 23 47->52         started        process19 signatures20 117 DLL side loading technique detected 52->117 55 conhost.exe 52->55         started        process21
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2023-08-14 03:30:49 UTC
File Type:
PE (Exe)
Extracted files:
25
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
modiloader
Score:
  10/10
Tags:
family:modiloader trojan
Behaviour
Suspicious use of WriteProcessMemory
Program crash
ModiLoader Second Stage
ModiLoader, DBatLoader
Unpacked files
SH256 hash:
4f1e9fb055d2edf64a82cd342bb580f3f1a2f7a2351ac8a2cddc25120bb726ac
MD5 hash:
8e98b3f01bd5da1f95682d7babb5a773
SHA1 hash:
8d57e14cae8930ece06ec08ca3dcc12e59618114
Detections:
DbatLoaderStage1 win_dbatloader_g1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:CMD_Ping_Localhost
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:MALWARE_Win_ModiLoader
Author:ditekSHen
Description:Detects ModiLoader
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Typical_Malware_String_Transforms
Author:Florian Roth (Nextron Systems)
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:Typical_Malware_String_Transforms_RID3473
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:without_attachments
Author:Antonio Sanchez <asanchez@hispasec.com>
Description:Rule to detect the no presence of any attachment
Reference:http://laboratorio.blogs.hispasec.com/
Rule name:without_urls
Author:Antonio Sanchez <asanchez@hispasec.com>
Description:Rule to detect the no presence of any url
Reference:http://laboratorio.blogs.hispasec.com/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

ModiLoader

Executable exe 4f1e9fb055d2edf64a82cd342bb580f3f1a2f7a2351ac8a2cddc25120bb726ac

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments