MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 92ffcaa512f2f1fe06c8d381f9fdf80a8f9d28fce269544d6a66afc02601d1a0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ModiLoader


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 92ffcaa512f2f1fe06c8d381f9fdf80a8f9d28fce269544d6a66afc02601d1a0
SHA3-384 hash: 879224b74e2b6b0ac33ee9e12e31c36ad370c8749bba0ff07a413446110c9d788aab379790e4b396c30cd887f8b85218
SHA1 hash: b1879ea25f6b7035f972be4ff610a6c94445c42f
MD5 hash: d1c28b2ac1da298b29c2be14e17918ad
humanhash: victor-jig-glucose-double
File name:92ffcaa512f2f1fe06c8d381f9fdf80a8f9d28fce269544d6a66afc02601d1a0
Download: download sample
Signature ModiLoader
File size:1'124'328 bytes
First seen:2020-10-19 09:54:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 94245201e5cc00b98dade674c50dde7b (1 x ArkeiStealer, 1 x ModiLoader)
ssdeep 24576:1lrqAQp9JOsAceJlvbmY7xakTQULYHSKqvypk/:XX1xmKakkULVKfA
Threatray 43 similar samples on MalwareBazaar
TLSH C2352206F6E0957ED2A2123185656FD4EBB4FF74076486D3B34E33029B7A6D2882C397
Reporter JAMESWT_WT
Tags:Incar LLC ModiLoader

Code Signing Certificate

Organisation:AAA Certificate Services
Issuer:AAA Certificate Services
Algorithm:sha1WithRSAEncryption
Valid from:Jan 1 00:00:00 2004 GMT
Valid to:Dec 31 23:59:59 2028 GMT
Serial number: 01
Intelligence: 367 malware samples on MalwareBazaar are signed with this code signing certificate
Cert Central Blocklist:This certificate is on the Cert Central blocklist
Thumbprint Algorithm:SHA256
Thumbprint: D7A7A0FB5D7E2731D771E9484EBCDEF71D5F0C3E0A2948782BC83EE0EA699EF4
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
84
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching a process
DNS request
Delayed writing of the file
Creating a process from a recently created file
Creating a file in the %AppData% subdirectories
Deleting a recently created file
Enabling the 'hidden' option for recently created files
Reading critical registry keys
Unauthorized injection to a recently created process by context flags manipulation
Sending a TCP request to an infection source
Enabling autorun by creating a file
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.spyw.evad
Score:
60 / 100
Signature
Contains functionality to register a low level keyboard hook
Creates processes via WMI
Drops PE files with a suspicious file extension
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Sigma detected: Suspicious Certutil Command
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 300036 Sample: RZd8IbsZx6 Startdate: 19/10/2020 Architecture: WINDOWS Score: 60 60 Multi AV Scanner detection for submitted file 2->60 62 Sigma detected: Drops script at startup location 2->62 64 Uses ping.exe to sleep 2->64 66 2 other signatures 2->66 9 RZd8IbsZx6.exe 7 2->9         started        12 wscript.exe 2->12         started        14 vloeSon.com 2->14         started        process3 dnsIp4 72 Contains functionality to register a low level keyboard hook 9->72 17 cmd.exe 1 9->17         started        19 cmd.exe 1 9->19         started        74 Creates processes via WMI 12->74 58 XWxpFKgBPY.XWxpFKgBPY 14->58 signatures5 process6 signatures7 22 cmd.exe 2 17->22         started        26 conhost.exe 17->26         started        68 Drops PE files with a suspicious file extension 19->68 28 conhost.exe 19->28         started        process8 file9 44 C:\Users\user\AppData\Local\...\rundll32.com, PE32 22->44 dropped 70 Uses ping.exe to sleep 22->70 30 rundll32.com 22->30         started        33 PING.EXE 1 22->33         started        36 PING.EXE 1 22->36         started        38 certutil.exe 2 22->38         started        signatures10 process11 dnsIp12 76 Drops PE files with a suspicious file extension 30->76 40 rundll32.com 6 30->40         started        50 127.0.0.1 unknown unknown 33->50 52 192.168.2.1 unknown unknown 33->52 54 HkaV.RmSFgD 36->54 signatures13 process14 dnsIp15 56 XWxpFKgBPY.XWxpFKgBPY 40->56 46 C:\Users\user\AppData\Roaming\...\vloeSon.com, PE32 40->46 dropped 48 C:\Users\user\AppData\Roaming\...\vloeSon.url, MS 40->48 dropped file16
Threat name:
Win32.Trojan.Alien
Status:
Malicious
First seen:
2020-10-15 17:16:10 UTC
File Type:
PE (Exe)
Extracted files:
8
AV detection:
21 of 27 (77.78%)
Threat level:
  5/5
Result
Malware family:
modiloader
Score:
  10/10
Tags:
trojan family:modiloader bootkit persistence spyware
Behaviour
Gathers network information
Runs ping.exe
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Writes to the Master Boot Record (MBR)
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
ModiLoader First Stage
ModiLoader, DBatLoader
Unpacked files
SH256 hash:
92ffcaa512f2f1fe06c8d381f9fdf80a8f9d28fce269544d6a66afc02601d1a0
MD5 hash:
d1c28b2ac1da298b29c2be14e17918ad
SHA1 hash:
b1879ea25f6b7035f972be4ff610a6c94445c42f
SH256 hash:
e7f774f9f1a68bfd4a5e4d9a1b5436d09699ec09e6515fcf2e1b7e3e515a749e
MD5 hash:
7b33404165ff7eddb4fc28a2e08e33e1
SHA1 hash:
3d9dce931a09f62f674a3102734e08331d633fc2
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments