MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6f898510dabd717ad5b9a0057dc3a2e89d69a0fe8ffb5b8c50183e767bfee34f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ModiLoader


Vendor detections: 14


Intelligence 14 IOCs YARA 4 File information Comments

SHA256 hash: 6f898510dabd717ad5b9a0057dc3a2e89d69a0fe8ffb5b8c50183e767bfee34f
SHA3-384 hash: ebcb1d73b1ce3640b7951b794aeecacfca73076f24a524258c2d773ba280195ea2c0009ba348036b8164b91c1f59fa76
SHA1 hash: 3b4c99b73b5c22d6b354ec870839d0a30722a83a
MD5 hash: 36802a63e5494320495544bb817b4bcf
humanhash: carbon-eleven-arkansas-cold
File name:ONEYMESC15768700_noncopy_20230124102200.exe
Download: download sample
Signature ModiLoader
File size:718'848 bytes
First seen:2023-01-24 10:28:42 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 5a1d07c71453f2216356e11a25273b2e (3 x ModiLoader, 1 x AveMariaRAT, 1 x RemcosRAT)
ssdeep 12288:Z1HbJXPhvoavMSPJ7Q7/S7sW/vCFovXe84SfPt3C:3lXZAavMo7Q74sECFoGhe1
TLSH T149E47C13A3F1C837E11969B5CD9B9AE86D1FBE202D14744A3EF03E0C6B3A1513DA9197
TrID 26.5% (.EXE) Win32 Executable Delphi generic (14182/79/4)
24.5% (.SCR) Windows screen saver (13097/50/3)
19.7% (.EXE) Win64 Executable (generic) (10523/12/4)
8.4% (.EXE) Win32 Executable (generic) (4505/5/1)
5.6% (.MZP) WinArchiver Mountable compressed Archive (3000/1)
File icon (PE):PE icon
dhash icon 64e0d4c2d494d09c (3 x ModiLoader, 2 x RemcosRAT, 1 x AveMariaRAT)
Reporter lowmal3
Tags:exe ModiLoader

Intelligence


File Origin
# of uploads :
1
# of downloads :
212
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
ONEYMESC15768700_noncopy_20230124102200.exe
Verdict:
Malicious activity
Analysis date:
2023-01-24 09:56:35 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching a process
Creating a process from a recently created file
Using the Windows Management Instrumentation requests
Creating a file in the %AppData% subdirectories
Reading critical registry keys
Creating a file in the %temp% directory
Searching for the window
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckScreenResolution
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
keylogger overlay zusy
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
FormBook, DBatLoader
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Detected FormBook malware
DLL side loading technique detected
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with a suspicious file extension
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Steal Google chrome login data
Snort IDS alert for network traffic
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses netstat to query active network connections and open ports
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected DBatLoader
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 790562 Sample: ONEYMESC15768700_noncopy_20... Startdate: 24/01/2023 Architecture: WINDOWS Score: 100 109 Snort IDS alert for network traffic 2->109 111 Malicious sample detected (through community Yara rule) 2->111 113 Antivirus detection for URL or domain 2->113 115 8 other signatures 2->115 10 Saphbvni.exe 1 2->10         started        14 ONEYMESC15768700_noncopy_20230124102200.exe 1 23 2->14         started        process3 dnsIp4 73 C:\Users\Public\Libraries\invbhpaS.pif, PE32 10->73 dropped 155 Multi AV Scanner detection for dropped file 10->155 157 Machine Learning detection for dropped file 10->157 159 Drops PE files with a suspicious file extension 10->159 161 Injects a PE file into a foreign processes 10->161 17 invbhpaS.pif 10->17         started        93 lyxxle.com 170.239.85.149, 443, 49701 ZAMLTDACL Chile 14->93 75 C:\Users\Public\Libraries\netutils.dll, PE32+ 14->75 dropped 77 C:\Users\Public\Libraries\easinvoker.exe, PE32+ 14->77 dropped 79 C:\Users\Public\Libraries\Saphbvni.exe, PE32 14->79 dropped 81 C:\Users\...\Saphbvni.exe:Zone.Identifier, ASCII 14->81 dropped 163 Writes to foreign memory regions 14->163 165 Allocates memory in foreign processes 14->165 167 Creates a thread in another existing process (thread injection) 14->167 20 cmd.exe 3 14->20         started        22 invbhpaS.pif 14->22         started        file5 signatures6 process7 signatures8 95 Modifies the context of a thread in another process (thread injection) 17->95 97 Maps a DLL or memory area into another process 17->97 99 Sample uses process hollowing technique 17->99 107 2 other signatures 17->107 24 explorer.exe 17->24 injected 101 Uses ping.exe to sleep 20->101 103 Drops executables to the windows directory (C:\Windows) and starts them 20->103 105 Uses ping.exe to check the status of other devices and networks 20->105 28 easinvoker.exe 20->28         started        30 PING.EXE 1 20->30         started        32 xcopy.exe 2 20->32         started        35 6 other processes 20->35 process9 dnsIp10 83 www.footballresults.website 109.228.34.39, 49710, 49711, 80 ONEANDONE-ASBrauerstrasse48DE United Kingdom 24->83 85 www.cn-pingfang.com 154.85.59.202, 49707, 49708, 80 BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtd Seychelles 24->85 87 www.mayfair.africa 24->87 151 System process connects to network (likely due to code injection or exploit) 24->151 153 Uses netstat to query active network connections and open ports 24->153 37 NETSTAT.EXE 24->37         started        41 Saphbvni.exe 24->41         started        43 mstsc.exe 24->43         started        47 3 other processes 24->47 45 cmd.exe 1 28->45         started        89 127.0.0.1 unknown unknown 30->89 91 192.168.2.1 unknown unknown 30->91 63 C:\Windows \System32\easinvoker.exe, PE32+ 32->63 dropped 65 C:\Windows \System32\netutils.dll, PE32+ 35->65 dropped file11 signatures12 process13 file14 69 C:\Users\user\AppData\...\09-logrv.ini, data 37->69 dropped 71 C:\Users\user\AppData\...\09-logri.ini, data 37->71 dropped 127 Detected FormBook malware 37->127 129 Tries to steal Mail credentials (via file / registry access) 37->129 131 Tries to harvest and steal browser information (history, passwords, etc) 37->131 149 2 other signatures 37->149 49 cmd.exe 37->49         started        133 Writes to foreign memory regions 41->133 135 Allocates memory in foreign processes 41->135 137 Creates a thread in another existing process (thread injection) 41->137 139 Injects a PE file into a foreign processes 41->139 53 invbhpaS.pif 41->53         started        141 DLL side loading technique detected 43->141 143 Tries to detect virtualization through RDTSC time measurements 43->143 145 Suspicious powershell command line found 45->145 147 Adds a directory exclusion to Windows Defender 45->147 55 powershell.exe 23 45->55         started        57 conhost.exe 45->57         started        signatures15 process16 file17 67 C:\Users\user\AppData\Local\Temp\DB1, SQLite 49->67 dropped 117 Tries to harvest and steal browser information (history, passwords, etc) 49->117 59 conhost.exe 49->59         started        119 Modifies the context of a thread in another process (thread injection) 53->119 121 Maps a DLL or memory area into another process 53->121 123 Sample uses process hollowing technique 53->123 125 DLL side loading technique detected 55->125 61 conhost.exe 55->61         started        signatures18 process19
Gathering data
Verdict:
malicious
Result
Malware family:
modiloader
Score:
  10/10
Tags:
family:formbook family:modiloader campaign:xm33 persistence rat spyware stealer trojan
Behaviour
Enumerates system info in registry
Modifies Internet Explorer settings
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Formbook payload
ModiLoader Second Stage
Formbook
ModiLoader, DBatLoader
Unpacked files
SH256 hash:
17bac612c9b6cf52b198ee1eb70003c8f86eeefe21305f3c63858bb77e2c322c
MD5 hash:
7b72abb55df82ba832e2819ebe7cbf45
SHA1 hash:
2db357f40c6816cf1386bf248fb338b203ffb3dc
Detections:
win_dbatloader_g1
Parent samples :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 hash:
6f898510dabd717ad5b9a0057dc3a2e89d69a0fe8ffb5b8c50183e767bfee34f
MD5 hash:
36802a63e5494320495544bb817b4bcf
SHA1 hash:
3b4c99b73b5c22d6b354ec870839d0a30722a83a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:aPLib_decompression
Author:@r3c0nst
Description:Detects aPLib decompression code often used in malware
Reference:https://ibsensoftware.com/files/aPLib-1.1.1.zip
Rule name:CMD_Ping_Localhost
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

ModiLoader

Executable exe 6f898510dabd717ad5b9a0057dc3a2e89d69a0fe8ffb5b8c50183e767bfee34f

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments