MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5a96f10901f5e9397ab423e189c002cd75901bb716c0ed1dab371f52f071cf3e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ModiLoader


Vendor detections: 8


Intelligence 8 IOCs YARA 7 File information Comments

SHA256 hash: 5a96f10901f5e9397ab423e189c002cd75901bb716c0ed1dab371f52f071cf3e
SHA3-384 hash: c555a67a68420997cf572009db1856e005b0797dc23281a927dd3c64a2dece6c20a0ab8e5e18a40ad39af3e54ade91c4
SHA1 hash: 12d81c7c5cda079cb3137601964279a77fc4fb2f
MD5 hash: 64c9c069d7548330d16f880b8ebc7ab2
humanhash: bacon-mike-kansas-october
File name:Potvrda narudzbe u prilogu.zip
Download: download sample
Signature ModiLoader
File size:436'186 bytes
First seen:2023-06-09 08:09:24 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 12288:6ivCRR7aQnJ3BLi3XFobUtr296IxGSayh7/jCo9rMWKXzE:LCb7rJBW3LN296kfa6PCoJMWT
TLSH T15294236612A99CCFFC357691A8C1DED434C4E450C3653DEBBD8C0C869D99F8EA0A42DE
TrID 80.0% (.ZIP) ZIP compressed archive (4000/1)
20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter cocaman
Tags:ModiLoader zip


Avatar
cocaman
Malicious email (T1566.001)
From: "=?UTF-8?Q?Biljana_Petrovi=C4=87?= <Biljana.Petrovic@tipteh.rs>" (likely spoofed)
Received: "from rdns.teknofirst.com.tr (unknown [176.88.51.4]) "
Date: "Tue, 06 Jun 2023 13:15:58 +0100"
Subject: "=?UTF-8?Q?=C2=A0RE=3A_Potvrda_narud=C5=BEbe?="
Attachment: "Potvrda narudzbe u prilogu.zip"

Intelligence


File Origin
# of uploads :
1
# of downloads :
92
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:Potvrda narudzbe u prilogu.exe
File size:862'720 bytes
SHA256 hash: 3d0a4a349eeeac6e36dfa03303badaa361a3eda756b06aac487479e0a4368b99
MD5 hash: 40c99aaf4aa9832ba5d446b1550776f9
MIME type:application/x-dosexec
Signature ModiLoader
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
barys greyware keylogger lolbin overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Spyware.AveMaria
Status:
Malicious
First seen:
2023-06-06 13:23:11 UTC
File Type:
Binary (Archive)
Extracted files:
45
AV detection:
18 of 24 (75.00%)
Threat level:
  2/5
Result
Malware family:
modiloader
Score:
  10/10
Tags:
family:formbook family:modiloader campaign:3nop persistence rat spyware stealer trojan
Behaviour
Modifies Internet Explorer settings
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious behavior: RenamesItself
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Enumerates connected drives
Reads user/profile data of web browsers
Formbook payload
ModiLoader Second Stage
Formbook
ModiLoader, DBatLoader
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CMD_Ping_Localhost
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse
Author:ditekSHen
Description:Detects file containing reversed ASEP Autorun registry keys
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Typical_Malware_String_Transforms
Author:Florian Roth (Nextron Systems)
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:Typical_Malware_String_Transforms_RID3473
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:win_dbatloader_g1
Author:Slavo Greminger, SWITCH-CERT
Description:targets stager

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

ModiLoader

zip 5a96f10901f5e9397ab423e189c002cd75901bb716c0ed1dab371f52f071cf3e

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
ModiLoader

Comments