MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 07d2154279196a70dc01a41c031f6dfe0a22895142afcdd57633b21d0ba852e7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DBatLoader


Vendor detections: 16


Intelligence 16 IOCs YARA 3 File information Comments

SHA256 hash: 07d2154279196a70dc01a41c031f6dfe0a22895142afcdd57633b21d0ba852e7
SHA3-384 hash: 64f4874824f9e970138e3c05f13dac29b2a4a4f89bd64dfed05d43391cd35f91c323fed8a8744e208af2f01dd9a7f7b7
SHA1 hash: 283152643a5641dde74027175e28a41633a88530
MD5 hash: c890482e5a566519d8cd4befcdd6b88c
humanhash: wisconsin-vegan-angel-yankee
File name:Sars_Notification.exe
Download: download sample
Signature DBatLoader
File size:2'620'416 bytes
First seen:2023-11-18 07:57:19 UTC
Last seen:2023-11-18 09:14:00 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 5bec2d3b10f2ecbed12c31f9d170e1c4 (1 x DBatLoader, 1 x RemcosRAT)
ssdeep 49152:SQBlwsJGhf+KMDMosVy+c+zM++AyvqTmhN8pEkV:SuwgwMsVy+cYv+AxwNM
Threatray 1 similar samples on MalwareBazaar
TLSH T124C50137B69288BFC05827380D1AA7D5F8582A12799872FD71CF24C4EE7D7816F39246
TrID 84.9% (.EXE) Win32 Executable Borland Delphi 6 (262638/61)
4.5% (.EXE) Win32 Executable Delphi generic (14182/79/4)
4.2% (.SCR) Windows screen saver (13097/50/3)
2.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.4% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 080bd46472f43c5c (4 x DBatLoader, 3 x RemcosRAT)
Reporter abuse_ch
Tags:DBatLoader exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
371
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
formbook
ID:
1
File name:
Sars_Notification.exe
Verdict:
Malicious activity
Analysis date:
2023-11-18 07:58:14 UTC
Tags:
dbatloader formbook xloader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
Gathering data
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control hook keylogger lolbin masquerade overlay packed remcos
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DBatLoader, FormBook
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for URL or domain
DLL side loading technique detected
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with a suspicious file extension
Early bird code injection technique detected
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected DBatLoader
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1344479 Sample: Sars_Notification.exe Startdate: 18/11/2023 Architecture: WINDOWS Score: 100 71 www.wangbaomen23.xyz 2->71 73 www.vevo-verify.com 2->73 75 20 other IPs or domains 2->75 85 Multi AV Scanner detection for domain / URL 2->85 87 Malicious sample detected (through community Yara rule) 2->87 89 Antivirus detection for URL or domain 2->89 93 5 other signatures 2->93 12 Sars_Notification.exe 1 7 2->12         started        16 Rdxbxram.PIF 2->16         started        18 Rdxbxram.PIF 2->18         started        signatures3 91 Performs DNS queries to domains with low reputation 71->91 process4 file5 65 C:\Users\Public\Libraries\netutils.dll, PE32+ 12->65 dropped 67 C:\Users\Public\Libraries\easinvoker.exe, PE32+ 12->67 dropped 69 C:\Users\Public\Libraries\Rdxbxram.PIF, PE32 12->69 dropped 115 Early bird code injection technique detected 12->115 117 Drops PE files with a suspicious file extension 12->117 119 Allocates memory in foreign processes 12->119 121 Queues an APC in another process (thread injection) 12->121 20 cmd.exe 1 12->20         started        23 colorcpl.exe 12->23         started        123 Multi AV Scanner detection for dropped file 16->123 125 Machine Learning detection for dropped file 16->125 25 SndVol.exe 16->25         started        27 SndVol.exe 18->27         started        signatures6 process7 signatures8 95 Uses ping.exe to sleep 20->95 97 Drops executables to the windows directory (C:\Windows) and starts them 20->97 99 Uses ping.exe to check the status of other devices and networks 20->99 29 easinvoker.exe 20->29         started        31 PING.EXE 1 20->31         started        34 xcopy.exe 2 20->34         started        39 8 other processes 20->39 101 Maps a DLL or memory area into another process 23->101 37 vDsTSJIqvuowAqIDQEBtdhD.exe 23->37 injected process9 dnsIp10 41 cmd.exe 1 29->41         started        83 127.0.0.1 unknown unknown 31->83 61 C:\Windows \System32\easinvoker.exe, PE32+ 34->61 dropped 44 xwizard.exe 37->44         started        63 C:\Windows \System32\netutils.dll, PE32+ 39->63 dropped file11 process12 signatures13 105 Adds a directory exclusion to Windows Defender 41->105 46 cmd.exe 1 41->46         started        49 conhost.exe 41->49         started        107 Tries to steal Mail credentials (via file / registry access) 44->107 109 Tries to harvest and steal browser information (history, passwords, etc) 44->109 111 Writes to foreign memory regions 44->111 113 3 other signatures 44->113 51 vDsTSJIqvuowAqIDQEBtdhD.exe 44->51 injected 54 firefox.exe 44->54         started        process14 dnsIp15 127 Adds a directory exclusion to Windows Defender 46->127 56 powershell.exe 27 46->56         started        77 www.aquatic-organisms.info 23.82.12.34, 49727, 49728, 49729 LEASEWEB-USA-WDCUS United States 51->77 79 inovaebook.online 162.240.81.18, 49751, 49752, 49753 UNIFIEDLAYER-AS-1US United States 51->79 81 10 other IPs or domains 51->81 signatures16 process17 signatures18 103 DLL side loading technique detected 56->103 59 conhost.exe 56->59         started        process19
Threat name:
Win32.Trojan.ModiLoader
Status:
Malicious
First seen:
2023-11-17 10:10:24 UTC
File Type:
PE (Exe)
Extracted files:
26
AV detection:
18 of 23 (78.26%)
Threat level:
  5/5
Result
Malware family:
modiloader
Score:
  10/10
Tags:
family:modiloader persistence trojan
Behaviour
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
ModiLoader Second Stage
ModiLoader, DBatLoader
Unpacked files
SH256 hash:
ea81cf5140fbca51f6acd5b7c41085993444c0b6e4af9eb0ba205e67311ec2b7
MD5 hash:
662be9260181d335fb8351957b458766
SHA1 hash:
ae5242d771a01b4648fe2d0d0a23423560980cc3
Detections:
win_dbatloader_g1 MALWARE_Win_ModiLoader
SH256 hash:
7bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301
MD5 hash:
c116d3604ceafe7057d77ff27552c215
SHA1 hash:
452b14432fb5758b46f2897aeccd89f7c82a727d
SH256 hash:
07d2154279196a70dc01a41c031f6dfe0a22895142afcdd57633b21d0ba852e7
MD5 hash:
c890482e5a566519d8cd4befcdd6b88c
SHA1 hash:
283152643a5641dde74027175e28a41633a88530
Detections:
DbatLoaderStage1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BobSoftMiniDelphiBoBBobSoft
Author:malware-lu
Rule name:Borland
Author:malware-lu
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

DBatLoader

Executable exe 07d2154279196a70dc01a41c031f6dfe0a22895142afcdd57633b21d0ba852e7

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments