

Asian Telecom Operators Targeted by Chinese Cyber Espionage Groups – Active IOCs
June 21, 2024
SideWinder APT Group aka Rattlesnake – Active IOCs
June 21, 2024
Asian Telecom Operators Targeted by Chinese Cyber Espionage Groups – Active IOCs
June 21, 2024
SideWinder APT Group aka Rattlesnake – Active IOCs
June 21, 2024Severity
Medium
Analysis Summary
ModiLoader - aka DBatLoader or NatsoLoader - was initially identified in June 2020. It is a two-stage loader that has been seen distributing the Remcos, Formbook, and Netwire trojans. This malware is typically spread through malicious email attachments, or by being bundled with legitimate software.
Once a user's device is infected with ModiLoader, it can perform several malicious actions such as:
- Download and install additional malware, such as ransomware or banking Trojans.
- Create a backdoor into the infected device, allowing hackers to gain access and control of the device.
- Collect and exfiltrate sensitive information from the infected device.
- Install additional payloads such as keyloggers, remote access tools, or even cryptocurrency mining software.
- Evade detection by changing the file names and executing from the memory.
ModiLoader is a persistent malware and uses various techniques to evade detection such as:
- Hiding the payload in a legitimate-looking file or hiding it in legitimate Windows system processes.
- Encrypting the payload to avoid detection by signature-based anti-virus software.
- Using a variety of anti-debugging and anti-emulation techniques to avoid detection by security researchers.
It is important to keep your device and software up to date and to exercise caution when opening email attachments or installing software from unfamiliar sources to protect against ModiLoader and other types of malware. In addition, using reputable anti-virus software and keeping it updated can help protect against ModiLoader and other types of malware.
Impact
- Sensitive Information Theft
- Data Exfiltration
Indicators of Compromise
MD5
- e36e9c3eeeeb46c6b54f44118539209a
- 7883702935e54b98bc4c4de461ccd977
- 8903e7e6ebd4f46e9910e2e6179c2778
- 7d0932523c11c434d2b132a2cf8a5835
- c57b287858b87f3528e1366bcb4359e8
- af9e835fc667bc0d5623fb958c85d10e
SHA-256
- d0dcdc6b9a1ff0a5f04c06825b1e1fe7486fa11b3d61cd2f2ae4d01fe1df7ad0
- ae1ad1ee347d6b057bafc3636c4bcf705c76126b0358c56b3e6dae6cf3be1533
- 49116eb9df67b39271c13a80c5044023c55044c2cb4c6303f2b8c2a936524cee
- 0fa941a6b21162bcb1eb878806a660cf6cf2b7fd28cc83744c65c757386f8666
- 119bb4f428f6056330cf8a0087b1a52277dbceca3cd81f1d5934c4f4a398c664
- b4e86c38b2b424b473220586c583c7da8ecb98d192581ef0ba37774911cf8351
SHA1
- 27c14367312d0f81ea1f717eb6006172b34a7c0c
- e1a218e3113db626a2ae6810a44f62c71d8bf656
- c8cee5411c1c414876f078ecfa9865eb893ad5af
- ac083ec95bcab40b618f4f53b76739be81e283f9
- 2629391b45ae9cb08c5df8dd53bdc7c7f222c171
- 38d325758725552205de9ab138cb0828c7b632bf
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Do not download documents attached in emails from unknown sources and strictly refrain from enabling macros when the source isn’t reliable.
- Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.
- Patch and upgrade any platforms and software timely and make it into a standard security policy.