MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 2c269830f25ce16896147da503148a0f223f79d05f27875e5beafbaba56cbf59. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
DBatLoader
Vendor detections: 9
| SHA256 hash: | 2c269830f25ce16896147da503148a0f223f79d05f27875e5beafbaba56cbf59 |
|---|---|
| SHA3-384 hash: | a7c9e6413bbae0fba76d37d2e564b89ddfafa149a2c43cfddf3434bf920a600a33589cdead89caedfbabb46cdd2d8ffa |
| SHA1 hash: | a38f2c353574b3d1deb4d7fd6f4d88f31166906a |
| MD5 hash: | 53c86188a87b8d0a73187e3ad6bfc30f |
| humanhash: | maryland-six-beryllium-solar |
| File name: | Silicone Pallet Mould MMS Request Order-015559.xls.exe |
| Download: | download sample |
| Signature | DBatLoader |
| File size: | 912'896 bytes |
| First seen: | 2022-02-15 11:22:41 UTC |
| Last seen: | 2022-02-15 15:26:57 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 395245e59962be96e38956eaadbe8ace (1 x AveMariaRAT, 1 x Formbook, 1 x DBatLoader) |
| ssdeep | 12288:MHJF21eFz0BwfJ4VOTKQLzjgmXWr9ioR0i1K2KPRCT+SNR:MpFArifJz1z3XM9ioL1KPIT+SNR |
| Threatray | 45 similar samples on MalwareBazaar |
| TLSH | T1A1157C12B5A08036D52A19B6CD0B93E07919FEB63D18AD0B3BEB3F4D5FB52807436257 |
| File icon (PE): | |
| dhash icon | 63311c0e4f3bffee (11 x Formbook, 7 x RemcosRAT, 3 x NetWire) |
| Reporter | |
| Tags: | DBatLoader exe |
Intelligence
File Origin
# of uploads :
3
# of downloads :
215
Origin country :
n/a
Vendor Threat Intelligence
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Searching for the window
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
control.exe keylogger packed remote.exe
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Suspicious
Result
Threat name:
DBatLoader
Detection:
malicious
Classification:
troj.evad
Score:
64 / 100
Signature
Initial sample is a PE file and has a suspicious name
Multi AV Scanner detection for submitted file
Uses an obfuscated file name to hide its real file extension (double extension)
Yara detected DBatLoader
Behaviour
Behavior Graph:
Threat name:
Win32.Spyware.AveMaria
Status:
Malicious
First seen:
2022-02-15 10:23:27 UTC
File Type:
PE (Exe)
Extracted files:
155
AV detection:
22 of 28 (78.57%)
Threat level:
2/5
Detection(s):
Suspicious file
Verdict:
unknown
Similar samples:
+ 35 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
10/10
Tags:
n/a
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Drops file in Windows directory
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
bc5eab9035807d258b611c670dbc460e72b99b22c65bc13dde5e3a2c4c8c9613
MD5 hash:
721f31a2cfa45743fbbe5d65d907a254
SHA1 hash:
dc17bf82ddd688e93af709465a171cc275dc6ba1
Detections:
win_dbatloader_w0
Parent samples :
40901dc70e02ccd60768da1dcb23556f9ab77cafd4bb074fba8440eb0470af21
89e2525019ea9d8e1050f42c57a2e4b54880c1ab929d69f8a5242dbe805c3e86
2c269830f25ce16896147da503148a0f223f79d05f27875e5beafbaba56cbf59
6a4b5aab71a352d6ae6140f99a28b0c38df78a8985b3383f1bc424ca74e046fe
af555bcf9af4d6cc249e3b6b14d73d61175bf9be40a57ce025b7b791e1c0186f
68b6c1ad6ae1afdd0ef585a7cc8f7072c7bc5ac95a1e5fd4a6389e8cc238d832
689b1874118f825772a1a032d8d4c119009e927b132638303256344b4896311e
79655e0deb2223be705fe64c7abde57e3d815e70a28ad51cae43703641e4c543
485d4ce29c089e745e40fb7690bcca17e733ff126a602992eefcd59c47c10f95
694f9f8f9d78da1cb5eeea8b7ea8257b12f8d1c1216125610437f2b0c89e7881
32f62f812e0b22d8227fd1cc681eae6f4484e94bef2d4abbfea0342a62a4e34b
882adac4b90bbb61698ae0056c7fc82a185f9b3e33f9ebbdb77bb20bcd16d41e
0d6135fd347e16b6257d853b329b335e0d3685625ef96a07241adc3e5ceeea91
b25132e9a9216fe583418ed48b0c8bacd0b5de58be6456a0c47a42cc5038bb29
aa5d2a0b371efb331119271dcbfcf4d8451ce1a4b87c786f6676a5234fd9c450
240b38b6a0a93427bad076df4c7ad9b1faf707f428fc74a31568af670103b8c6
3ce133222e75c154a06fbc81d2c85307ad5a4d843fa0ec322018a9061e489c5d
38dcf8f5d97d63180c107bc7ab5e00d0a23a589f8210c26ee6523ae0cd76a6ef
bc5eab9035807d258b611c670dbc460e72b99b22c65bc13dde5e3a2c4c8c9613
89e2525019ea9d8e1050f42c57a2e4b54880c1ab929d69f8a5242dbe805c3e86
2c269830f25ce16896147da503148a0f223f79d05f27875e5beafbaba56cbf59
6a4b5aab71a352d6ae6140f99a28b0c38df78a8985b3383f1bc424ca74e046fe
af555bcf9af4d6cc249e3b6b14d73d61175bf9be40a57ce025b7b791e1c0186f
68b6c1ad6ae1afdd0ef585a7cc8f7072c7bc5ac95a1e5fd4a6389e8cc238d832
689b1874118f825772a1a032d8d4c119009e927b132638303256344b4896311e
79655e0deb2223be705fe64c7abde57e3d815e70a28ad51cae43703641e4c543
485d4ce29c089e745e40fb7690bcca17e733ff126a602992eefcd59c47c10f95
694f9f8f9d78da1cb5eeea8b7ea8257b12f8d1c1216125610437f2b0c89e7881
32f62f812e0b22d8227fd1cc681eae6f4484e94bef2d4abbfea0342a62a4e34b
882adac4b90bbb61698ae0056c7fc82a185f9b3e33f9ebbdb77bb20bcd16d41e
0d6135fd347e16b6257d853b329b335e0d3685625ef96a07241adc3e5ceeea91
b25132e9a9216fe583418ed48b0c8bacd0b5de58be6456a0c47a42cc5038bb29
aa5d2a0b371efb331119271dcbfcf4d8451ce1a4b87c786f6676a5234fd9c450
240b38b6a0a93427bad076df4c7ad9b1faf707f428fc74a31568af670103b8c6
3ce133222e75c154a06fbc81d2c85307ad5a4d843fa0ec322018a9061e489c5d
38dcf8f5d97d63180c107bc7ab5e00d0a23a589f8210c26ee6523ae0cd76a6ef
bc5eab9035807d258b611c670dbc460e72b99b22c65bc13dde5e3a2c4c8c9613
SH256 hash:
2c269830f25ce16896147da503148a0f223f79d05f27875e5beafbaba56cbf59
MD5 hash:
53c86188a87b8d0a73187e3ad6bfc30f
SHA1 hash:
a38f2c353574b3d1deb4d7fd6f4d88f31166906a
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.