MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cac8aa8905e94aea2c6de8ca8d3a15d3eccbcd66c03008c54fde952551fc5ca6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ModiLoader


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: cac8aa8905e94aea2c6de8ca8d3a15d3eccbcd66c03008c54fde952551fc5ca6
SHA3-384 hash: fec2d0ff2236c3a8021a04596699c268e5925e870236593c9b863992550e08bf225fdb8c4aea053ec9be4433761f61ba
SHA1 hash: c98497d1e10ad77e15f79b91004ac8373b40105d
MD5 hash: 5a5a15d9df1806b71692844870308fde
humanhash: july-batman-pluto-lamp
File name:Платежный_документ_71Q51933.pdf.exe
Download: download sample
Signature ModiLoader
File size:1'221'120 bytes
First seen:2020-10-09 05:54:15 UTC
Last seen:2020-10-09 07:08:55 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 624fe783ce1fbfc247a3c0409d1b1239 (6 x ModiLoader)
ssdeep 12288:0pP5SyQ9wblP2AB469py931hFrPRDfI4xZLx7kX8np0vx7yUDc+:0pR26vZy93NpTjxjkMnp0
Threatray 513 similar samples on MalwareBazaar
TLSH 39456D12B290CC36D1E22A749C4BD6B89926BE407D27A8473BE43F0DBF797513439297
Reporter abuse_ch
Tags:exe ModiLoader


Avatar
abuse_ch
Malspam distributing ModiLoader:

HELO: box0.billaccountant.com
Sending IP: 45.84.196.64
From: Г-жа Наталья Чангпути <office@billaccountant.com>
Subject: Re: Платежный документ 77Q57133
Attachment: Платежный_документ_71Q51933.pdf.7z (contains "Платежный_документ_71Q51933.pdf.exe")

Intelligence


File Origin
# of uploads :
2
# of downloads :
86
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file
Launching a process
Running batch commands
Creating a process with a hidden window
Deleting a recently created file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Sending a TCP request to an infection source
Unauthorized injection to a system process
Result
Threat name:
NetWire
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to log keystrokes
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Internet Explorer form passwords
Creates a thread in another existing process (thread injection)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Fodhelper UAC Bypass
Sigma detected: NetWire
Uses an obfuscated file name to hide its real file extension (double extension)
Writes to foreign memory regions
Yara detected NetWire RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 295562 Sample: 1933.pdf.exe Startdate: 09/10/2020 Architecture: WINDOWS Score: 100 53 Antivirus / Scanner detection for submitted sample 2->53 55 Multi AV Scanner detection for submitted file 2->55 57 Yara detected NetWire RAT 2->57 59 7 other signatures 2->59 8 Mxgsnek.exe 13 2->8         started        12 1933.pdf.exe 1 15 2->12         started        15 Mxgsnek.exe 13 2->15         started        process3 dnsIp4 43 162.159.128.233, 443, 49742, 49743 CLOUDFLARENETUS United States 8->43 45 162.159.135.233, 443, 49744 CLOUDFLARENETUS United States 8->45 61 Antivirus detection for dropped file 8->61 63 Multi AV Scanner detection for dropped file 8->63 65 Writes to foreign memory regions 8->65 17 ieinstal.exe 8->17         started        47 cdn.discordapp.com 162.159.129.233, 443, 49726 CLOUDFLARENETUS United States 12->47 49 discord.com 162.159.135.232, 443, 49724, 49725 CLOUDFLARENETUS United States 12->49 39 C:\Users\user\AppData\Local\...\Mxgsnek.exe, PE32 12->39 dropped 67 Allocates memory in foreign processes 12->67 69 Creates a thread in another existing process (thread injection) 12->69 71 Injects a PE file into a foreign processes 12->71 19 notepad.exe 4 12->19         started        22 ieinstal.exe 2 12->22         started        51 162.159.133.233, 443, 49747 CLOUDFLARENETUS United States 15->51 25 ieinstal.exe 15->25         started        file5 signatures6 process7 dnsIp8 37 C:\Users\Public37atso.bat, ASCII 19->37 dropped 27 cmd.exe 1 19->27         started        29 cmd.exe 1 19->29         started        41 79.134.225.100, 3434, 49738 FINK-TELECOM-SERVICESCH Switzerland 22->41 file9 process10 process11 31 conhost.exe 27->31         started        33 reg.exe 1 1 27->33         started        35 conhost.exe 29->35         started       
Threat name:
Win32.Trojan.RemcosCrypt
Status:
Malicious
First seen:
2020-10-08 10:53:01 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Modifies system certificate store
Suspicious use of WriteProcessMemory
Unpacked files
SH256 hash:
cac8aa8905e94aea2c6de8ca8d3a15d3eccbcd66c03008c54fde952551fc5ca6
MD5 hash:
5a5a15d9df1806b71692844870308fde
SHA1 hash:
c98497d1e10ad77e15f79b91004ac8373b40105d
Detections:
win_dbatloader_auto
SH256 hash:
42116e7effb885a2a668abf712264b87d300d1514637057dbe130885f494d8c9
MD5 hash:
48fa09119a0394c3b4d3eb682a0b31e4
SHA1 hash:
d0371277d28aa3a318f41a768a89e99e93a10041
Detections:
win_dbatloader_g0 win_dbatloader_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_dbatloader_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

ModiLoader

Executable exe cac8aa8905e94aea2c6de8ca8d3a15d3eccbcd66c03008c54fde952551fc5ca6

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments