MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1dddbd9bb1c2ed3b0ac846f3dcfbfd99909394f17a813be425b1870ef0f52c5e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DBatLoader


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 1dddbd9bb1c2ed3b0ac846f3dcfbfd99909394f17a813be425b1870ef0f52c5e
SHA3-384 hash: 5524d6ba482a3fe1a7845c7bb8914c802d682b62559c87a5dfa41c9fd6b828196e22106f7cb4ff3803944ad1df6590f3
SHA1 hash: b108f80184bfd67c0a330fc6cbe53c72ddc5cd1d
MD5 hash: 39e87adaffb0260e016087a5fb82a1bb
humanhash: fifteen-don-fanta-jig
File name:Drawing_0029388827772_Square_General_ContractingDrawing_0029388827772_Square_General_Contracting.exe
Download: download sample
Signature DBatLoader
File size:732'672 bytes
First seen:2022-08-08 08:10:30 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash cc1fadbd23c2bfd0a0322aa7e67d1d3f (4 x DBatLoader, 3 x Formbook, 1 x RemcosRAT)
ssdeep 12288:KmhCsMYEubn0UsjX4gaYv+tdqw1xBXEtFSOUHU3PiyMcCd5sY3nk1J4z:xnMYEbTjfaxtdqQVESreixHfk1Wz
TLSH T111F4AEF5F28145F2DD23267BC82A9DA5E5267F20253C159BABE43EDC4E386C0351F292
TrID 28.5% (.SCR) Windows screen saver (13101/52/3)
22.9% (.EXE) Win64 Executable (generic) (10523/12/4)
14.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
9.8% (.EXE) Win32 Executable (generic) (4505/5/1)
6.5% (.MZP) WinArchiver Mountable compressed Archive (3000/1)
File icon (PE):PE icon
dhash icon c730f4e4d4d830c7 (5 x DBatLoader, 3 x Formbook, 2 x RemcosRAT)
Reporter 0xToxin
Tags:DBatLoader exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
343
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Drawing_0029388827772_Square_General_ContractingDrawing_0029388827772_Square_General_Contracting.exe
Verdict:
Malicious activity
Analysis date:
2022-08-08 08:12:53 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching the process to interact with network services
Launching a process
Using the Windows Management Instrumentation requests
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckScreenResolution
CheckCmdLine
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
greyware keylogger packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
NetWire
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Connects to many ports of the same IP (likely port scanning)
Creates a thread in another existing process (thread injection)
Found evasive API chain (may stop execution after checking mutex)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected NetWire RAT
Yara detected UAC Bypass using ComputerDefaults
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 680258 Sample: Drawing_0029388827772_Squar... Startdate: 08/08/2022 Architecture: WINDOWS Score: 100 55 Multi AV Scanner detection for domain / URL 2->55 57 Antivirus detection for dropped file 2->57 59 Yara detected UAC Bypass using ComputerDefaults 2->59 61 4 other signatures 2->61 8 Drawing_0029388827772_Square_General_ContractingDrawing_0029388827772_Square_General_Contracting.exe 1 21 2->8         started        13 Sdvfknogb.exe 13 2->13         started        15 Sdvfknogb.exe 13 2->15         started        process3 dnsIp4 47 greenenergies.pk 65.21.166.30, 443, 49745, 49746 CP-ASDE United States 8->47 41 C:\Users\Public\Libraries\Sdvfknogb.exe, PE32 8->41 dropped 43 C:\Users\Public\Libraries\SdvfknogbO.bat, ASCII 8->43 dropped 45 C:\Users\...\Sdvfknogb.exe:Zone.Identifier, ASCII 8->45 dropped 63 Writes to foreign memory regions 8->63 65 Allocates memory in foreign processes 8->65 67 Creates a thread in another existing process (thread injection) 8->67 69 Injects a PE file into a foreign processes 8->69 17 cmd.exe 1 8->17         started        20 cmd.exe 1 8->20         started        71 Multi AV Scanner detection for dropped file 13->71 73 Machine Learning detection for dropped file 13->73 22 cmd.exe 1 13->22         started        49 192.168.2.1 unknown unknown 15->49 24 cmd.exe 1 15->24         started        file5 signatures6 process7 signatures8 53 Found evasive API chain (may stop execution after checking mutex) 17->53 26 cmd.exe 1 17->26         started        29 conhost.exe 17->29         started        31 conhost.exe 20->31         started        33 conhost.exe 22->33         started        35 conhost.exe 24->35         started        process9 dnsIp10 51 pentester01.duckdns.org 197.211.61.51, 52048 globacom-asNG Nigeria 26->51 37 WerFault.exe 23 9 26->37         started        39 conhost.exe 26->39         started        process11
Threat name:
Win32.Trojan.ModiLoader
Status:
Malicious
First seen:
2022-08-08 08:11:17 UTC
File Type:
PE (Exe)
Extracted files:
19
AV detection:
19 of 25 (76.00%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
netwirerc
Result
Malware family:
modiloader
Score:
  10/10
Tags:
family:modiloader persistence trojan
Behaviour
Checks processor information in registry
Enumerates system info in registry
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in System32 directory
Adds Run key to start application
Checks computer location settings
Blocklisted process makes network request
ModiLoader, DBatLoader
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments