MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5df1620ac50ad894eb4777fb9e01f02971348ff7dc061b6519b0112bab041ae6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ModiLoader


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 5df1620ac50ad894eb4777fb9e01f02971348ff7dc061b6519b0112bab041ae6
SHA3-384 hash: 4ea94d394b6768c0acf4daff71a5fb32665f69b5609380d049a28e26797de7b22f9ce9051462dc2706919648b79730f3
SHA1 hash: bb7ced6978223aebe4d3fa30cf23c1ab2efed372
MD5 hash: 3ecc987b0355454c2478c37143698d36
humanhash: five-iowa-network-saturn
File name:Order inquiry.com
Download: download sample
Signature ModiLoader
File size:1'220'096 bytes
First seen:2020-11-06 07:36:28 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash eb7f24d623823df7a34ad95dfb8bfd95 (15 x ModiLoader, 1 x AveMariaRAT, 1 x Loki)
ssdeep 24576:Q0S5Bo6taFaaRKDZAI89d6yzEJR4GpQSMXVHfo:QpjExRbzEJuGpRMX
Threatray 1'236 similar samples on MalwareBazaar
TLSH EE455B72FA40D431E42229355D1BC6FCA43ABD702D24940A7BE9EF5C6E362D3B936247
Reporter abuse_ch
Tags:com ModiLoader


Avatar
abuse_ch
Malspam distributing ModiLoader:

HELO: alias8.gemini.surf
Sending IP: 185.192.245.17
From: Caecilia Egger <admin@gemini.surf>
Subject: RE INQUIRY
Attachment: Order inquiry.rar (contains "Order inquiry.com")

Intelligence


File Origin
# of uploads :
1
# of downloads :
86
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Launching a process
Creating a file in the %AppData% subdirectories
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Setting a global event handler for the keyboard
Result
Threat name:
Remcos ModiLoader
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Creates a thread in another existing process (thread injection)
Detected Remcos RAT
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Writes to foreign memory regions
Yara detected ModiLoader
Yara detected Remcos RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2020-11-06 01:56:28 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:modiloader family:remcos persistence rat trojan
Behaviour
Modifies system certificate store
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Adds Run key to start application
ModiLoader Second Stage
ServiceHost packer
ModiLoader, DBatLoader
Remcos
Unpacked files
SH256 hash:
5df1620ac50ad894eb4777fb9e01f02971348ff7dc061b6519b0112bab041ae6
MD5 hash:
3ecc987b0355454c2478c37143698d36
SHA1 hash:
bb7ced6978223aebe4d3fa30cf23c1ab2efed372
SH256 hash:
5f024670eb7a3bc4db9275b056aae0ecc88b896bfd0142ce2a27fe3d33106670
MD5 hash:
78ea5cb15bc928c1886043baa35930a7
SHA1 hash:
3dbd8b412cf6841b541a2cc24d123de9f7988e69
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

ModiLoader

Executable exe 5df1620ac50ad894eb4777fb9e01f02971348ff7dc061b6519b0112bab041ae6

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments