MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f7841777611acb2e73e3d7e6596ed5359870d40d7d44338658163974538fe340. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
ModiLoader
Vendor detections: 13
| SHA256 hash: | f7841777611acb2e73e3d7e6596ed5359870d40d7d44338658163974538fe340 |
|---|---|
| SHA3-384 hash: | 3a628d7823e3e70154092a4cb09d9e18c42f0be156b752b8e08c915fa6839c5db953cd69b017a77cd62d924fdceefaed |
| SHA1 hash: | 1a5de9b4429c0c7e2b888f799e310fea6ba404f5 |
| MD5 hash: | 3d741e7270be70d772e5abda42348fd3 |
| humanhash: | mississippi-lamp-rugby-london |
| File name: | file |
| Download: | download sample |
| Signature | ModiLoader |
| File size: | 978'944 bytes |
| First seen: | 2022-10-10 14:21:12 UTC |
| Last seen: | 2022-10-11 10:14:00 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | faa13790e0ceb8f1607ec55da2778103 (3 x ModiLoader) |
| ssdeep | 24576:satTADYIErC0I2D3QauLMMQUtVSn52Ao:stxnLm+Sn52A |
| Threatray | 161 similar samples on MalwareBazaar |
| TLSH | T1EF25BF22F2D08933C167297C4D4F83B89CEABE112E247A8627E52D4C5F76B517D253A3 |
| TrID | 26.5% (.EXE) Win32 Executable Delphi generic (14182/79/4) 24.5% (.SCR) Windows screen saver (13101/52/3) 19.7% (.EXE) Win64 Executable (generic) (10523/12/4) 8.4% (.EXE) Win32 Executable (generic) (4505/5/1) 5.6% (.MZP) WinArchiver Mountable compressed Archive (3000/1) |
| File icon (PE): | |
| dhash icon | c4b3d9cde5f1bedc (1 x ModiLoader) |
| Reporter | |
| Tags: | exe ModiLoader |
andretavare5
Sample downloaded from https://vk.com/doc638734270_651367574?hash=9ieZzBQsn3WTScVDZZP880fh0876bEyPz5mpCAWRrAw&dl=GYZTQNZTGQZDOMA:1665410839:RH0uv3ttV0aJjYovOJ9rOCkC7J75UBNd7lSOvO6HgBs&api=1&no_preview=1#newIntelligence
File Origin
# of uploads :
470
# of downloads :
202
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
socelars
ID:
1
File name:
Setup.exe
Verdict:
Malicious activity
Analysis date:
2022-10-11 06:05:38 UTC
Tags:
evasion opendir trojan socelars stealer loader raccoon recordbreaker rat redline
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
Creating a file
Launching a process
Creating a process with a hidden window
Creating a file in the system32 subdirectories
DNS request
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Moving a file to the %AppData% subdirectory
Using the Windows Management Instrumentation requests
Reading critical registry keys
Query of malicious DNS domain
Sending a TCP request to an infection source
Stealing user critical data
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
6/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckScreenResolution
CheckCmdLine
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
80%
Tags:
keylogger packed shell32.dll wscript.exe
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
Result
Threat name:
DBatLoader
Detection:
malicious
Classification:
troj.expl.evad
Score:
80 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Trojan.Bingoml
Status:
Malicious
First seen:
2022-10-10 14:22:10 UTC
File Type:
PE (Exe)
Extracted files:
41
AV detection:
23 of 26 (88.46%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 151 additional samples on MalwareBazaar
Result
Malware family:
modiloader
Score:
10/10
Tags:
family:modiloader discovery spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
Blocklisted process makes network request
ModiLoader Second Stage
ModiLoader, DBatLoader
Verdict:
Informative
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
c54e00ceeec27e2b0624e5b630b1ace61537ad33da437185405dbc70a666623f
MD5 hash:
f07429fc678461954273bff02af63983
SHA1 hash:
439c7c989252dc0a4b257c4214f82e3bf0df7d96
Detections:
win_dbatloader_g1
SH256 hash:
f7841777611acb2e73e3d7e6596ed5359870d40d7d44338658163974538fe340
MD5 hash:
3d741e7270be70d772e5abda42348fd3
SHA1 hash:
1a5de9b4429c0c7e2b888f799e310fea6ba404f5
Detections:
DbatLoaderStage1
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
DBatLoader
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Dropped by
PrivateLoader
Delivery method
Distributed via drive-by
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.