MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f47a579ec7384b201fda64a499f13217c1be1c137a679cc16d57dc7fc455c4cc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
ModiLoader
Vendor detections: 13
| SHA256 hash: | f47a579ec7384b201fda64a499f13217c1be1c137a679cc16d57dc7fc455c4cc |
|---|---|
| SHA3-384 hash: | 6d82902aff10eef855365f70529108e75c94672c0db3d9c3664fe564d30217be7ac95dd7b6ad9b7bf34c185c50f3c9c1 |
| SHA1 hash: | a355f0ad297e6ccec26a7d2b8721d1556b800acd |
| MD5 hash: | a6d907e7ccbe468f7f1445fde115251f |
| humanhash: | stairway-fix-december-ack |
| File name: | PO.exe |
| Download: | download sample |
| Signature | ModiLoader |
| File size: | 980'480 bytes |
| First seen: | 2022-08-29 14:52:14 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 55a02a3bb89eabb57a7926d8b815868b (4 x ModiLoader, 3 x Formbook, 1 x RemcosRAT) |
| ssdeep | 24576:MrTz0kNGlNCc5Ftkku4nzSrSdN40JIyE9WDvk:MrT4LN9Ftkku4nzSrSdmWbaW |
| TLSH | T10425BFF6B2D24A33D0131A7DCE17A319696ABE501E18748A3BF53E5CDF34681343A297 |
| TrID | 93.9% (.EXE) Win32 Executable Borland Delphi 7 (664796/42/58) 2.0% (.EXE) Win32 Executable Delphi generic (14182/79/4) 1.8% (.SCR) Windows screen saver (13101/52/3) 0.6% (.EXE) Win32 Executable (generic) (4505/5/1) 0.4% (.MZP) WinArchiver Mountable compressed Archive (3000/1) |
| File icon (PE): | |
| dhash icon | eef2eed69696eabe (10 x RemcosRAT, 8 x ModiLoader, 6 x Formbook) |
| Reporter | |
| Tags: | exe ModiLoader |
Intelligence
File Origin
# of uploads :
1
# of downloads :
395
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
PO.exe
Verdict:
Malicious activity
Analysis date:
2022-08-29 14:57:39 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching a process
Creating a process from a recently created file
Searching for the window
Creating a file in the %temp% directory
Using the Windows Management Instrumentation requests
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
keylogger remcos
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Suspicious
Result
Threat name:
DBatLoader, PrivateLoader, Remcos
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
DLL side loading technique detected
Drops executables to the windows directory (C:\Windows) and starts them
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suspicious powershell command line found
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected DBatLoader
Yara detected PrivateLoader
Yara detected Remcos RAT
Yara detected UAC Bypass using ComputerDefaults
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Remcos
Status:
Malicious
First seen:
2022-08-29 00:31:50 UTC
File Type:
PE (Exe)
Extracted files:
28
AV detection:
22 of 26 (84.62%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Result
Malware family:
remcos
Score:
10/10
Tags:
family:modiloader family:remcos botnet:remotehost persistence rat trojan
Behaviour
Enumerates system info in registry
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Adds Run key to start application
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
ModiLoader Second Stage
ModiLoader, DBatLoader
Remcos
Malware Config
C2 Extraction:
185.140.53.160:2404
Unpacked files
SH256 hash:
dd98aba7a667aa34e7883503f23b3f8efff8b4b56e22f753a72b37c14a3127b3
MD5 hash:
dfd91793d4bb73bb475e0acecf94c9f7
SHA1 hash:
f5ec6cb9eeae23da65a478b614b9b74370878670
Detections:
win_dbatloader_g1
Parent samples :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 hash:
f47a579ec7384b201fda64a499f13217c1be1c137a679cc16d57dc7fc455c4cc
MD5 hash:
a6d907e7ccbe468f7f1445fde115251f
SHA1 hash:
a355f0ad297e6ccec26a7d2b8721d1556b800acd
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Delivery method
Other
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.