MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 00174652cb6423c2ab0160ebbaa0b5918daa97c297ca39526232cb06e60c7ad9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DBatLoader


Vendor detections: 14


Intelligence 14 IOCs YARA 4 File information Comments

SHA256 hash: 00174652cb6423c2ab0160ebbaa0b5918daa97c297ca39526232cb06e60c7ad9
SHA3-384 hash: 8509b292abd88580a73b0bbb3199f85380b3aa56dd34745762d34cb6219429afb1770376ba1d2d7d3236ad42ebf5c3c5
SHA1 hash: 1d5dfcca5a902855ad8f4d565c76bb5a48ccba9f
MD5 hash: 43fdd9dc77a91762c91517844b9f588f
humanhash: fourteen-carbon-fillet-steak
File name:PIN.exe
Download: download sample
Signature DBatLoader
File size:1'178'624 bytes
First seen:2023-09-28 21:40:03 UTC
Last seen:2023-09-28 22:34:46 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d020f949ba89411d7c49f3baa1ad9952 (7 x DBatLoader, 2 x RemcosRAT)
ssdeep 24576:E+x0KeaVl6fTAz/92jMRffknKdEfV17E+/:E+9zID1I+/
Threatray 143 similar samples on MalwareBazaar
TLSH T18D452A4A7FADDC60E4A127BD8C8D1BE2B82D79C136B5CC9122643D4B49112E57DE80BF
TrID 54.3% (.EXE) InstallShield setup (43053/19/16)
16.5% (.SCR) Windows screen saver (13097/50/3)
13.2% (.EXE) Win64 Executable (generic) (10523/12/4)
5.6% (.EXE) Win32 Executable (generic) (4505/5/1)
2.6% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon 74f4d4d4cce4e8e0 (27 x AgentTesla, 19 x Formbook, 17 x DBatLoader)
Reporter r3dbU7z
Tags:DBatLoader exe ModiLoader webdav

Intelligence


File Origin
# of uploads :
2
# of downloads :
353
Origin country :
RU RU
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
PIN.exe
Verdict:
Malicious activity
Analysis date:
2023-09-28 22:24:19 UTC
Tags:
dbatloader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Creating a file
Running batch commands
Creating a process with a hidden window
Launching a process
Creating a process from a recently created file
Using the Windows Management Instrumentation requests
Setting a keyboard event handler
Searching for the window
Сreating synchronization primitives
Creating a window
DNS request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Gathering data
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control keylogger lolbin
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
AveMaria, DBatLoader, UACMe
Detection:
malicious
Classification:
phis.troj.spyw.expl.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates many large memory junks
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to check if Internet connection is working
Contains functionality to hide user accounts
Contains functionality to inject threads in other processes
Contains functionality to modify clipboard data
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal e-mail passwords
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
DLL side loading technique detected
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with a suspicious file extension
Found evasive API chain (may stop execution after checking mutex)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Increases the number of concurrent connection per server for Internet Explorer
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Sample uses process hollowing technique
Snort IDS alert for network traffic
Uses dynamic DNS services
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected AveMaria stealer
Yara detected DBatLoader
Yara detected UACMe UAC Bypass tool
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1316111 Sample: PIN.exe Startdate: 28/09/2023 Architecture: WINDOWS Score: 100 85 Snort IDS alert for network traffic 2->85 87 Found malware configuration 2->87 89 Malicious sample detected (through community Yara rule) 2->89 91 10 other signatures 2->91 11 PIN.exe 1 8 2->11         started        16 Gjaiztgi.PIF 2->16         started        18 Gjaiztgi.PIF 2->18         started        process3 dnsIp4 69 y8aqzq.bl.files.1drv.com 11->69 77 3 other IPs or domains 11->77 57 C:\Users\Public\Libraries\netutils.dll, PE32+ 11->57 dropped 59 C:\Users\Public\Libraries\igtziajG.pif, PE32 11->59 dropped 61 C:\Users\Public\Libraries\easinvoker.exe, PE32+ 11->61 dropped 63 C:\Users\Public\Librariesbehaviorgraphjaiztgi.PIF, PE32 11->63 dropped 113 Contains functionality to hide user accounts 11->113 115 Drops PE files with a suspicious file extension 11->115 117 Writes to foreign memory regions 11->117 20 igtziajG.pif 3 4 11->20         started        24 cmd.exe 1 11->24         started        71 l-0003.l-dc-msedge.net 13.107.43.12, 443, 49799, 49810 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 16->71 73 l-0004.l-dc-msedge.net 13.107.43.13, 443, 49798, 49809 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 16->73 79 4 other IPs or domains 16->79 119 Antivirus detection for dropped file 16->119 121 Multi AV Scanner detection for dropped file 16->121 123 Machine Learning detection for dropped file 16->123 26 igtziajG.pif 16->26         started        75 y8aqzq.bl.files.1drv.com 18->75 81 3 other IPs or domains 18->81 125 Allocates memory in foreign processes 18->125 127 Sample uses process hollowing technique 18->127 129 Allocates many large memory junks 18->129 28 igtziajG.pif 18->28         started        file5 signatures6 process7 dnsIp8 67 freshwarsmi.ddns.net 154.53.51.233, 49796, 5200 COGENT-174US United States 20->67 93 Detected unpacking (changes PE section rights) 20->93 95 Detected unpacking (overwrites its own PE header) 20->95 97 Found evasive API chain (may stop execution after checking mutex) 20->97 107 8 other signatures 20->107 99 Uses ping.exe to sleep 24->99 101 Drops executables to the windows directory (C:\Windows) and starts them 24->101 103 Uses ping.exe to check the status of other devices and networks 24->103 30 easinvoker.exe 24->30         started        32 PING.EXE 1 24->32         started        35 xcopy.exe 2 24->35         started        38 8 other processes 24->38 105 Contains functionality to hide user accounts 26->105 signatures9 process10 dnsIp11 40 cmd.exe 1 30->40         started        65 127.0.0.1 unknown unknown 32->65 53 C:\Windows \System32\easinvoker.exe, PE32+ 35->53 dropped 55 C:\Windows \System32\netutils.dll, PE32+ 38->55 dropped file12 process13 signatures14 109 Adds a directory exclusion to Windows Defender 40->109 43 cmd.exe 1 40->43         started        46 conhost.exe 40->46         started        process15 signatures16 111 Adds a directory exclusion to Windows Defender 43->111 48 powershell.exe 22 43->48         started        process17 signatures18 83 DLL side loading technique detected 48->83 51 conhost.exe 48->51         started        process19
Threat name:
Win32.Trojan.ModiLoader
Status:
Malicious
First seen:
2023-09-28 21:41:06 UTC
File Type:
PE (Exe)
Extracted files:
102
AV detection:
17 of 23 (73.91%)
Threat level:
  5/5
Result
Malware family:
warzonerat
Score:
  10/10
Tags:
family:modiloader family:warzonerat infostealer persistence rat trojan
Behaviour
Enumerates system info in registry
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
ModiLoader Second Stage
Warzone RAT payload
ModiLoader, DBatLoader
WarzoneRat, AveMaria
Malware Config
C2 Extraction:
freshwarsmi.ddns.net:5200
Unpacked files
SH256 hash:
ef5bc3ed536de4c9a5c02ebf475f01b810728afad6c064a236bcd71a985d20a3
MD5 hash:
610239ed40a95c217783a309c03fe8ee
SHA1 hash:
ef7188222285bb5f871bd4bf9a85fdcb0f42b186
Detections:
win_dbatloader_g1
Parent samples :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 hash:
15f9cd5a44c510116ad38a5b6811fad14d42c31d19269bde09ccbc27460421e5
MD5 hash:
84c9a58fd3a459062b95ba04cc9c9caf
SHA1 hash:
5987e4af1481f016149ef3700745e42592e5179e
SH256 hash:
7bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301
MD5 hash:
c116d3604ceafe7057d77ff27552c215
SHA1 hash:
452b14432fb5758b46f2897aeccd89f7c82a727d
SH256 hash:
00174652cb6423c2ab0160ebbaa0b5918daa97c297ca39526232cb06e60c7ad9
MD5 hash:
43fdd9dc77a91762c91517844b9f588f
SHA1 hash:
1d5dfcca5a902855ad8f4d565c76bb5a48ccba9f
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BobSoftMiniDelphiBoBBobSoft
Author:malware-lu
Rule name:Borland
Author:malware-lu
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DBatLoader

Executable exe 00174652cb6423c2ab0160ebbaa0b5918daa97c297ca39526232cb06e60c7ad9

(this sample)

  
Delivery method
Distributed via web download

Comments