MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 27d32b2af6392daaa9d08da8dec30cf109e82da5778ab1c7db87be3c8cc91502. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
ModiLoader
Vendor detections: 11
| SHA256 hash: | 27d32b2af6392daaa9d08da8dec30cf109e82da5778ab1c7db87be3c8cc91502 |
|---|---|
| SHA3-384 hash: | 8dd18247db091246c35d849b2ba3d5d204ff9a90769dc1a7f90489913b92b820229f4e7b0a6a0e7511232fe7fb5e5bf4 |
| SHA1 hash: | 90b08b9bde911152cc89475a0bed6acdbaa518a8 |
| MD5 hash: | e8055021bc8341f5a008c14ad2550890 |
| humanhash: | rugby-romeo-twelve-mirror |
| File name: | muestrasXdeXproductosXpdf.exe |
| Download: | download sample |
| Signature | ModiLoader |
| File size: | 1'000'960 bytes |
| First seen: | 2022-10-10 09:28:44 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | faa13790e0ceb8f1607ec55da2778103 (3 x ModiLoader) |
| ssdeep | 24576:KatTADYIErC0I2D3QauLMMQUtVSn52Ao:KtxnLy+Sn52A |
| Threatray | 152 similar samples on MalwareBazaar |
| TLSH | T170259F22F6D04933C177197C8D1B53685DEBBE202D286B462BE57D4C1F3AA8179263B3 |
| TrID | 26.5% (.EXE) Win32 Executable Delphi generic (14182/79/4) 24.5% (.SCR) Windows screen saver (13101/52/3) 19.7% (.EXE) Win64 Executable (generic) (10523/12/4) 8.4% (.EXE) Win32 Executable (generic) (4505/5/1) 5.6% (.MZP) WinArchiver Mountable compressed Archive (3000/1) |
| File icon (PE): | |
| dhash icon | 326aaa92aa8e96aa (2 x ModiLoader, 1 x BitRAT) |
| Reporter | |
| Tags: | exe ModiLoader |
Intelligence
File Origin
# of uploads :
1
# of downloads :
227
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
Creating a file
Launching a process
Creating a process with a hidden window
Sending a custom TCP request
DNS request
Searching for synchronization primitives
Creating a file in the %AppData% subdirectories
Reading critical registry keys
Launching cmd.exe command interpreter
Creating a file in the %temp% directory
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
6/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckScreenResolution
CheckCmdLine
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
keylogger overlay packed shell32.dll wscript.exe
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
Result
Threat name:
DBatLoader
Detection:
malicious
Classification:
troj.expl.evad
Score:
84 / 100
Signature
Allocates memory in foreign processes
Creates a thread in another existing process (thread injection)
Detected unpacking (creates a PE file in dynamic memory)
Multi AV Scanner detection for submitted file
Writes to foreign memory regions
Yara detected DBatLoader
Yara detected UAC Bypass using ComputerDefaults
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Bingoml
Status:
Malicious
First seen:
2022-10-10 08:22:24 UTC
File Type:
PE (Exe)
Extracted files:
45
AV detection:
21 of 26 (80.77%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
formbook
Similar samples:
+ 142 additional samples on MalwareBazaar
Result
Malware family:
modiloader
Score:
10/10
Tags:
family:modiloader trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Program crash
Blocklisted process makes network request
ModiLoader Second Stage
ModiLoader, DBatLoader
Verdict:
Informative
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
c54e00ceeec27e2b0624e5b630b1ace61537ad33da437185405dbc70a666623f
MD5 hash:
f07429fc678461954273bff02af63983
SHA1 hash:
439c7c989252dc0a4b257c4214f82e3bf0df7d96
Detections:
win_dbatloader_g1
SH256 hash:
27d32b2af6392daaa9d08da8dec30cf109e82da5778ab1c7db87be3c8cc91502
MD5 hash:
e8055021bc8341f5a008c14ad2550890
SHA1 hash:
90b08b9bde911152cc89475a0bed6acdbaa518a8
Detections:
DbatLoaderStage1
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
DBatLoader
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.