MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 91622a9d48459e615ea429ef8b03411ce90df650cedd5c451436ee36123593a9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ModiLoader


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: 91622a9d48459e615ea429ef8b03411ce90df650cedd5c451436ee36123593a9
SHA3-384 hash: 5010951d36619b4dcfa280e283bbd7af6aebb3106df3781088303a848d534d562da1388aacebf5b4786c2d26c7cd18e5
SHA1 hash: 82d8bf0a50109bf0702c7fed649461a2324242e8
MD5 hash: 4f342724438a01e93ceff54e84de9162
humanhash: queen-utah-fix-uniform
File name:JOIN DOO ORDER.exe
Download: download sample
Signature ModiLoader
File size:1'236'824 bytes
First seen:2020-10-09 06:13:00 UTC
Last seen:2020-10-09 07:09:03 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 624fe783ce1fbfc247a3c0409d1b1239 (6 x ModiLoader)
ssdeep 12288:DpP5SyQ9wblP2AB469py931hFrPRDfI4xZLx7kX8mp0vx7yUDk+O:DpR26vZy93NpTjxjkMmp04
Threatray 980 similar samples on MalwareBazaar
TLSH EB456D12B291CC36C1E22A749C5FC6B8992ABD407D27A84736E43F0DBF797513839297
Reporter abuse_ch
Tags:exe ModiLoader

Intelligence


File Origin
# of uploads :
2
# of downloads :
85
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Launching a process
Running batch commands
Creating a process with a hidden window
Creating a file in the %AppData% subdirectories
Deleting a recently created file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Setting a global event handler for the keyboard
Sending a TCP request to an infection source
Unauthorized injection to a system process
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Creates a thread in another existing process (thread injection)
Detected Remcos RAT
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Fodhelper UAC Bypass
Sigma detected: Remcos
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 295601 Sample: JOIN DOO ORDER.exe Startdate: 09/10/2020 Architecture: WINDOWS Score: 100 57 Malicious sample detected (through community Yara rule) 2->57 59 Antivirus / Scanner detection for submitted sample 2->59 61 Multi AV Scanner detection for submitted file 2->61 63 10 other signatures 2->63 8 JOIN DOO ORDER.exe 1 15 2->8         started        13 Afzhnek.exe 13 2->13         started        15 Afzhnek.exe 13 2->15         started        process3 dnsIp4 45 cdn.discordapp.com 162.159.129.233, 443, 49733 CLOUDFLARENETUS United States 8->45 47 discord.com 162.159.137.232, 443, 49731, 49732 CLOUDFLARENETUS United States 8->47 41 C:\Users\user\AppData\Local\...\Afzhnek.exe, PE32 8->41 dropped 65 Writes to foreign memory regions 8->65 67 Allocates memory in foreign processes 8->67 69 Creates a thread in another existing process (thread injection) 8->69 17 ieinstal.exe 2 3 8->17         started        21 notepad.exe 4 8->21         started        49 162.159.130.233, 443, 49752 CLOUDFLARENETUS United States 13->49 51 162.159.138.232, 443, 49750, 49751 CLOUDFLARENETUS United States 13->51 71 Antivirus detection for dropped file 13->71 73 Multi AV Scanner detection for dropped file 13->73 75 Injects a PE file into a foreign processes 13->75 23 ieinstal.exe 13->23         started        53 162.159.128.233, 443, 49753, 49754 CLOUDFLARENETUS United States 15->53 55 162.159.134.233, 443, 49755 CLOUDFLARENETUS United States 15->55 25 ieinstal.exe 15->25         started        file5 signatures6 process7 dnsIp8 43 miklo2600.ddns.net 79.134.225.112, 1987, 49748 FINK-TELECOM-SERVICESCH Switzerland 17->43 37 C:\Users\user\AppData\Roaming\...\logs.dat, ASCII 17->37 dropped 39 C:\Users\Public39atso.bat, ASCII 21->39 dropped 27 cmd.exe 1 21->27         started        29 cmd.exe 1 21->29         started        file9 process10 process11 31 conhost.exe 27->31         started        33 reg.exe 1 1 27->33         started        35 conhost.exe 29->35         started       
Threat name:
Win32.Trojan.RemcosCrypt
Status:
Malicious
First seen:
2020-10-08 06:43:33 UTC
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
trojan family:modiloader rat family:remcos persistence
Behaviour
Modifies registry key
Modifies system certificate store
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Adds Run key to start application
ModiLoader, DBatLoader
Remcos
Unpacked files
SH256 hash:
91622a9d48459e615ea429ef8b03411ce90df650cedd5c451436ee36123593a9
MD5 hash:
4f342724438a01e93ceff54e84de9162
SHA1 hash:
82d8bf0a50109bf0702c7fed649461a2324242e8
Detections:
win_dbatloader_auto
SH256 hash:
3e7dd49ff0792b8c39c06723bd9105a0126a54fc8d76e5252f3c5ee3f49bb584
MD5 hash:
f085c4b4763c2a5321f28e4f6c759de0
SHA1 hash:
0cde93d3984faf2fdfbab0891b15aa04482d279a
Detections:
win_dbatloader_g0 win_dbatloader_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_dbatloader_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

ModiLoader

Executable exe 91622a9d48459e615ea429ef8b03411ce90df650cedd5c451436ee36123593a9

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments