MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1a77fe43c21c77b47c1ea009c8a7c082eb11abcfb48ff4375cce7edc0925e9c6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DBatLoader


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments 1

SHA256 hash: 1a77fe43c21c77b47c1ea009c8a7c082eb11abcfb48ff4375cce7edc0925e9c6
SHA3-384 hash: f3914f65d2211ec9b78b02ff8cbfac91c8c25fe0fc4b963c7c56e0ba165c55387cedb9d1632ffb0a21c0a3045d98e3f4
SHA1 hash: 26e7916e14c62f1351955131eb77c1e1072e5706
MD5 hash: 48afd1f2e1c80cb7ba09ffa901e75617
humanhash: sodium-undress-iowa-diet
File name:48afd1f2e1c80cb7ba09ffa901e75617
Download: download sample
Signature DBatLoader
File size:808'960 bytes
First seen:2021-12-03 10:50:51 UTC
Last seen:2021-12-03 12:44:00 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 736a08351cbcd8a9092505e560d10910 (2 x Formbook, 1 x DBatLoader)
ssdeep 12288:fIFljVcvVpFbFnH7WTgZtLGTY54m8Bz+FFiWAygV8BcFcePyaW:fIz6pFb1HZSc54m8Bz+viWAy68Cbm
Threatray 12'048 similar samples on MalwareBazaar
TLSH T1C6059EB27AD06D73C4AB1D79CC57BFA8B8363E211E96758939F468C81F343423A1A453
File icon (PE):PE icon
dhash icon b670390284e2da70 (14 x Formbook, 3 x RemcosRAT, 3 x AveMariaRAT)
Reporter zbetcheckin
Tags:32 DBatLoader exe

Intelligence


File Origin
# of uploads :
3
# of downloads :
141
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
9001.xlsx
Verdict:
Malicious activity
Analysis date:
2021-12-03 09:47:41 UTC
Tags:
encrypted opendir exploit CVE-2017-11882 loader trojan formbook stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Creating a file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Result
Malware family:
n/a
Score:
  0/10
Tags:
n/a
Behaviour
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
67%
Tags:
zusy
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DBatLoader FormBook
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
Found malware configuration
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Self deletion via cmd delete
Tries to detect virtualization through RDTSC time measurements
Uses ipconfig to lookup or modify the Windows network settings
Yara detected DBatLoader
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 533282 Sample: mIGDBMK7uK Startdate: 03/12/2021 Architecture: WINDOWS Score: 100 61 Multi AV Scanner detection for domain / URL 2->61 63 Found malware configuration 2->63 65 Malicious sample detected (through community Yara rule) 2->65 67 5 other signatures 2->67 9 mIGDBMK7uK.exe 1 17 2->9         started        process3 dnsIp4 45 oqpejw.am.files.1drv.com 9->45 47 onedrive.live.com 9->47 49 am-files.fe.1drv.com 9->49 31 C:\Users\user\Rethlvww.exe, PE32 9->31 dropped 69 Drops PE files to the user root directory 9->69 71 Modifies the context of a thread in another process (thread injection) 9->71 73 Maps a DLL or memory area into another process 9->73 75 3 other signatures 9->75 14 explorer.exe 2 9->14 injected file5 signatures6 process7 signatures8 77 Uses ipconfig to lookup or modify the Windows network settings 14->77 17 ipconfig.exe 14->17         started        20 Rethlvww.exe 15 14->20         started        23 Rethlvww.exe 15 14->23         started        process9 dnsIp10 51 Self deletion via cmd delete 17->51 53 Modifies the context of a thread in another process (thread injection) 17->53 55 Maps a DLL or memory area into another process 17->55 25 cmd.exe 1 17->25         started        27 explorer.exe 146 17->27         started        33 192.168.2.1 unknown unknown 20->33 35 oqpejw.am.files.1drv.com 20->35 43 2 other IPs or domains 20->43 57 Multi AV Scanner detection for dropped file 20->57 59 Tries to detect virtualization through RDTSC time measurements 20->59 37 oqpejw.am.files.1drv.com 23->37 39 onedrive.live.com 23->39 41 am-files.fe.1drv.com 23->41 signatures11 process12 process13 29 conhost.exe 25->29         started       
Threat name:
Win32.Trojan.SpyNoon
Status:
Malicious
First seen:
2021-12-03 07:37:24 UTC
File Type:
PE (Exe)
Extracted files:
77
AV detection:
20 of 28 (71.43%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Adds Run key to start application
Malware family:
XLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DBatLoader

Executable exe 1a77fe43c21c77b47c1ea009c8a7c082eb11abcfb48ff4375cce7edc0925e9c6

(this sample)

Comments



Avatar
zbet commented on 2021-12-03 10:50:52 UTC

url : hxxp://13.113.149.209/9001/bonsoo.exe