MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b038110e09ae5a44a0819b104ae1e5a6a422fb80b60eeecb1e2cde1af22a359b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ModiLoader


Vendor detections: 6


Intelligence 6 IOCs YARA 4 File information Comments

SHA256 hash: b038110e09ae5a44a0819b104ae1e5a6a422fb80b60eeecb1e2cde1af22a359b
SHA3-384 hash: d68fe986c728bec8f0b8d19667feae46a2438571cfc4a26b7b4a1302bd1b52c7e1b2de957eff6c8fb44a4a7d1fb00036
SHA1 hash: 55b3b53dfc1151c173051bc1b36fe9a89d09cd3c
MD5 hash: 0df60e942304cd709d8b7c64567926c0
humanhash: cup-fanta-hydrogen-magnesium
File name:E-PO-023635 - E-22-00343 - Ataya Table Escape at Heritage Village AUH 2022.tar
Download: download sample
Signature ModiLoader
File size:602'624 bytes
First seen:2022-11-17 11:22:32 UTC
Last seen:Never
File type: tar
MIME type:application/x-tar
ssdeep 12288:uDjeLlJcFNDJJCTbtCk1wvGMJfGb8/4OQL:uDiT6pyJcGMJfGw/LQL
TLSH T198D49F15F6504473F267193E5C9F8B67881B7D913E24ACA66BE42D4C7B3C742382E2A3
TrID 62.9% (.TAR/GTAR) TAR - Tape ARchive (GNU) (17/3)
37.0% (.TAR) TAR - Tape ARchive (file) (10/3)
Reporter cocaman
Tags:ModiLoader tar

Intelligence


File Origin
# of uploads :
1
# of downloads :
141
Origin country :
n/a
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:E-PO-023635 - E-22-00343 - Ataya Table Escape at Heritage Village AUH 2022.exe
File size:600'824 bytes
SHA256 hash: 3ec75aa62228c2043c7834516a087d14fb0ff1cf89a060edb10cbd3e296e3fc4
MD5 hash: 1d84dc95d2a21666cc0038e0febd677f
MIME type:application/x-dosexec
Signature ModiLoader
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
keylogger overlay packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Backdoor.Remcos
Status:
Malicious
First seen:
2022-11-17 10:09:27 UTC
File Type:
Binary (Archive)
Extracted files:
96
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Result
Malware family:
warzonerat
Score:
  10/10
Tags:
family:modiloader family:warzonerat infostealer persistence rat trojan
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops file in Program Files directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Adds Run key to start application
Modifies WinLogon
Loads dropped DLL
Sets DLL path for service in the registry
ModiLoader Second Stage
Warzone RAT payload
ModiLoader, DBatLoader
WarzoneRat, AveMaria
Malware Config
C2 Extraction:
chexfotii.ddns.net:4545
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:Sectigo_Code_Signed
Description:Detects code signed by the Sectigo RSA Code Signing CA
Reference:https://bazaar.abuse.ch/export/csv/cscb/
Rule name:win_dbatloader_g1
Author:Slavo Greminger, SWITCH-CERT
Description:targets stager

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

ModiLoader

tar b038110e09ae5a44a0819b104ae1e5a6a422fb80b60eeecb1e2cde1af22a359b

(this sample)

Comments