MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 b44ef524ef77ea1ee0bcb7096b328f6f94a4621df0d15114e8ff43e83483bbc6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
ModiLoader
Vendor detections: 8
| SHA256 hash: | b44ef524ef77ea1ee0bcb7096b328f6f94a4621df0d15114e8ff43e83483bbc6 |
|---|---|
| SHA3-384 hash: | b31453f17c9f4544e6f6905fca5cd8132876489a02362b948e57e942f6899de09c8f4c3c6c1e21936069e7214dd54441 |
| SHA1 hash: | 38fd7f247f0e87c958fedba1a430c8fb60bba0b4 |
| MD5 hash: | 760cff8f2cda554ccbdd63f0fd86cf7d |
| humanhash: | five-hawaii-comet-lamp |
| File name: | Civqczg_Signed_.exe |
| Download: | download sample |
| Signature | ModiLoader |
| File size: | 1'050'776 bytes |
| First seen: | 2020-10-15 11:23:45 UTC |
| Last seen: | 2020-10-15 12:15:51 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | a31ea16644ced8e431e2fe203a7b0361 (15 x ModiLoader, 4 x Loki, 1 x RemcosRAT) |
| ssdeep | 24576:9FT7lBs40jT0sUbtpW/nAOPq3Sp58wn7nLT6USE/7LYUx5t8SH1V:9vBsxTEi5d7nLT6USE/7kUPtF |
| Threatray | 442 similar samples on MalwareBazaar |
| TLSH | D425CF31F3E2CA36F25315318C2B5BB99532BE002A24945A76E63D4D9E367F079392D3 |
| Reporter | |
| Tags: | DHL exe ModiLoader |
abuse_ch
Malspam distributing ModiLoader:From: DHL Express Shipment <dhlSender@dhl.com>
Subject: DHL Express Shipment Confirmation
Attachment: DHL Shipment.gz (contains "Civqczg_Signed_.exe")
Intelligence
File Origin
# of uploads :
2
# of downloads :
75
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Sending a UDP request
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Launching a process
Unauthorized injection to a recently created process
Running batch commands
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Deleting a recently created file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.adwa.evad
Score:
100 / 100
Signature
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Injects a PE file into a foreign processes
Modifies the hosts file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Fodhelper UAC Bypass
Writes to foreign memory regions
Yara detected AgentTesla
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-10-15 07:50:45 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 432 additional samples on MalwareBazaar
Result
Malware family:
modiloader
Score:
10/10
Tags:
persistence trojan family:modiloader
Behaviour
Modifies registry key
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
ModiLoader Second Stage
ModiLoader, DBatLoader
Unpacked files
SH256 hash:
b44ef524ef77ea1ee0bcb7096b328f6f94a4621df0d15114e8ff43e83483bbc6
MD5 hash:
760cff8f2cda554ccbdd63f0fd86cf7d
SHA1 hash:
38fd7f247f0e87c958fedba1a430c8fb60bba0b4
SH256 hash:
d5e65ed2333f906ef70945253f401c11c23fff095142c58c521a4c20f902aa8e
MD5 hash:
4d063a983fb28c30239f129f3e3b99c4
SHA1 hash:
70f2f5e0b14505a2491b304364954ab989c0c209
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.