MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e09a767ad0a00ade6074dcc43b64010206220db79086c3bf9a7330ce1b603cc6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ModiLoader


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: e09a767ad0a00ade6074dcc43b64010206220db79086c3bf9a7330ce1b603cc6
SHA3-384 hash: 604d17c8f0c8b7b62039caaf3b6f07591008e29fc5fb3b036039f9fe9a64ee46864a3b0cb47ae811a7f63d8ef60e9871
SHA1 hash: 74ac80e2ef80ef4142b87e9966c7467270d95bc6
MD5 hash: c532d96ddc45a2191d48dd6ea20e1afc
humanhash: spring-friend-white-music
File name:SecuriteInfo.com.Win32.InjectorX-gen.18903.24176
Download: download sample
Signature ModiLoader
File size:787'968 bytes
First seen:2022-10-25 09:23:13 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2b0a8acc88a118a43eebdb148f9f94ce (2 x ModiLoader, 2 x NetWire)
ssdeep 12288:hCUL5e5qQvVHmVo+R0OXL4r70eYt8JyynITtsUXnvxwUxLfHazzJrN:s45INvVGVoU0OXLPxMyyIuUPB
Threatray 803 similar samples on MalwareBazaar
TLSH T1F5F49E27BFD15D37F117197ACCABD369A8297E207E18D4862AEC1D895F3F9423428093
TrID 23.4% (.EXE) Win32 Executable Delphi generic (14182/79/4)
21.6% (.SCR) Windows screen saver (13101/52/3)
17.4% (.EXE) Win64 Executable (generic) (10523/12/4)
16.5% (.EXE) DOS Borland compiled Executable (generic) (10000/1/2)
7.4% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 34f4c6c4d4d4d4d4 (3 x ModiLoader, 2 x NetWire)
Reporter SecuriteInfoCom
Tags:exe ModiLoader

Intelligence


File Origin
# of uploads :
1
# of downloads :
212
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Invoice #0049334.img
Verdict:
Malicious activity
Analysis date:
2022-10-25 07:49:12 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Launching a process
Creating a process with a hidden window
Searching for the window
Setting a global event handler
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Setting a global event handler for the keyboard
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckScreenResolution
CheckCmdLine
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
BitRAT, DBatLoader
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Writes to foreign memory regions
Yara detected BitRAT
Yara detected DBatLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 730045 Sample: SecuriteInfo.com.Win32.Inje... Startdate: 25/10/2022 Architecture: WINDOWS Score: 100 24 davidmanne.casacam.net 2->24 42 Multi AV Scanner detection for domain / URL 2->42 44 Malicious sample detected (through community Yara rule) 2->44 46 Multi AV Scanner detection for submitted file 2->46 48 4 other signatures 2->48 7 SecuriteInfo.com.Win32.InjectorX-gen.18903.24176.exe 1 18 2->7         started        12 Prdtjvjj.exe 15 2->12         started        signatures3 process4 dnsIp5 26 l-0003.l-dc-msedge.net 13.107.43.12, 443, 49697, 49699 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 7->26 28 yjxtha.sn.files.1drv.com 7->28 34 2 other IPs or domains 7->34 20 C:\Users\Public\Libraries\Prdtjvjj.exe, PE32 7->20 dropped 22 C:\Users\...\Prdtjvjj.exe:Zone.Identifier, ASCII 7->22 dropped 50 Writes to foreign memory regions 7->50 52 Allocates memory in foreign processes 7->52 54 Creates a thread in another existing process (thread injection) 7->54 56 Injects a PE file into a foreign processes 7->56 14 colorcpl.exe 3 2 7->14         started        30 l-0004.l-dc-msedge.net 13.107.43.13, 443, 49700, 49702 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 12->30 32 yjxtha.sn.files.1drv.com 12->32 36 2 other IPs or domains 12->36 58 Multi AV Scanner detection for dropped file 12->58 60 Machine Learning detection for dropped file 12->60 18 colorcpl.exe 12->18         started        file6 signatures7 process8 dnsIp9 38 davidmanne.casacam.net 20.12.20.153, 2223, 49704, 49705 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 14->38 40 192.168.2.1 unknown unknown 14->40 62 Hides threads from debuggers 14->62 signatures10
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2022-10-25 07:45:16 UTC
File Type:
PE (Exe)
Extracted files:
11
AV detection:
17 of 26 (65.38%)
Threat level:
  5/5
Result
Malware family:
modiloader
Score:
  10/10
Tags:
family:bitrat family:modiloader persistence trojan upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Adds Run key to start application
UPX packed file
ModiLoader Second Stage
BitRAT
ModiLoader, DBatLoader
Malware Config
C2 Extraction:
davidmanne.casacam.net:2223
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments