MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 517e2fa5e107a458f382dce0def885aa44ef55749f75432811ff205e025e623e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DBatLoader


Vendor detections: 11


Intelligence 11 IOCs YARA 2 File information Comments

SHA256 hash: 517e2fa5e107a458f382dce0def885aa44ef55749f75432811ff205e025e623e
SHA3-384 hash: dd32bfd6f34bd66c754f139cfd1b998b1e04c74e0d6f8ea0d5ef3fb206734feb322ade4f58e5cae68ea4363b6a198c34
SHA1 hash: fae12f61a023abcbbec1a27d147ab3d2f347d6e5
MD5 hash: b029e715d110a6fae5c2dba6af17e101
humanhash: salami-fillet-asparagus-mockingbird
File name:Repeat_Order_#020823.bat
Download: download sample
Signature DBatLoader
File size:2'542'403 bytes
First seen:2024-02-09 07:22:14 UTC
Last seen:Never
File type:Batch (bat) bat
MIME type:text/plain
ssdeep 49152:V0Rqhg1OTb9q9haAOxrosriRdAcYK+BdfjoceCD:T
TLSH T1D7C5DF3845465ED9FB488BE58748D7DF2D68342BB12AD32A4DAC916111BF4B7CA3C0EC
TrID 45.4% (.MP3) MP3 audio (ID3 v1.x tag) (2500/1/1)
36.3% (.TXT) Text - UTF-16 (LE) encoded (2000/1)
18.1% (.MP3) MP3 audio (1000/1)
Reporter lowmal3
Tags:bat DBatLoader

Intelligence


File Origin
# of uploads :
1
# of downloads :
114
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
masquerade obfuscated
Result
Verdict:
MALICIOUS
Result
Threat name:
FormBook, DBatLoader
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected FormBook malware
Drops PE files to the user root directory
Drops PE files with a suspicious file extension
Early bird code injection technique detected
Found large BAT file
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample is not signed and drops a device driver
Sample uses process hollowing technique
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Execution from Suspicious Folder
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: Rundll32 Execution Without CommandLine Parameters
Sigma detected: Steal Google chrome login data
Sigma detected: Suspicious Program Location with Network Connections
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected DBatLoader
Yara detected FormBook
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1389604 Sample: Repeat_Order_#020823.bat Startdate: 09/02/2024 Architecture: WINDOWS Score: 100 88 www.veripost.net 2->88 90 www.transmigrationholdings.com 2->90 92 16 other IPs or domains 2->92 120 Snort IDS alert for network traffic 2->120 122 Found malware configuration 2->122 124 Malicious sample detected (through community Yara rule) 2->124 126 17 other signatures 2->126 13 cmd.exe 1 2->13         started        signatures3 process4 signatures5 152 Uses ping.exe to sleep 13->152 154 Uses ping.exe to check the status of other devices and networks 13->154 16 cmd.exe 1 13->16         started        18 certutil.exe 3 2 13->18         started        22 cmd.exe 1 13->22         started        24 3 other processes 13->24 process6 file7 26 pointer.com 1 8 16->26         started        76 C:\Users\Public\pointer.com, PE32 18->76 dropped 128 Drops PE files to the user root directory 18->128 130 Drops PE files with a suspicious file extension 18->130 31 conhost.exe 18->31         started        132 Uses ping.exe to sleep 22->132 33 PING.EXE 1 22->33         started        signatures8 process9 dnsIp10 100 dual-spov-0006.spov-msedge.net 13.107.137.11, 443, 49729, 49730 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 26->100 78 C:\Users\Public\Libraries\truesight.sys, PE32+ 26->78 dropped 80 C:\Users\Public\Libraries\netutils.dll, PE32+ 26->80 dropped 82 C:\Users\Public\Libraries\easinvoker.exe, PE32+ 26->82 dropped 84 3 other malicious files 26->84 dropped 144 Early bird code injection technique detected 26->144 146 Machine Learning detection for dropped file 26->146 148 Drops PE files with a suspicious file extension 26->148 150 3 other signatures 26->150 35 colorcpl.exe 26->35         started        38 cmd.exe 1 26->38         started        102 127.0.0.1 unknown unknown 33->102 file11 signatures12 process13 signatures14 134 Modifies the context of a thread in another process (thread injection) 35->134 136 Maps a DLL or memory area into another process 35->136 138 Sample uses process hollowing technique 35->138 140 Tries to detect virtualization through RDTSC time measurements 35->140 40 explorer.exe 66 4 35->40 injected 44 cmd.exe 2 38->44         started        46 conhost.exe 38->46         started        process15 dnsIp16 94 www.beauty-bloom.online 185.151.30.191, 49748, 49749, 80 TWENTYIGB United Kingdom 40->94 96 www.remedydx.com 216.40.34.41, 49750, 49751, 80 TUCOWSCA Canada 40->96 98 5 other IPs or domains 40->98 142 System process connects to network (likely due to code injection or exploit) 40->142 48 rundll32.exe 18 40->48         started        52 Hnteypqi.PIF 40->52         started        54 Hnteypqi.PIF 40->54         started        58 4 other processes 40->58 56 conhost.exe 44->56         started        signatures17 process18 file19 72 C:\Users\user\AppData\...\901logrv.ini, data 48->72 dropped 74 C:\Users\user\AppData\...\901logri.ini, data 48->74 dropped 104 System process connects to network (likely due to code injection or exploit) 48->104 106 Detected FormBook malware 48->106 108 Tries to steal Mail credentials (via file / registry access) 48->108 118 5 other signatures 48->118 60 cmd.exe 2 48->60         started        64 firefox.exe 48->64         started        110 Early bird code injection technique detected 52->110 112 Machine Learning detection for dropped file 52->112 114 Allocates memory in foreign processes 52->114 66 colorcpl.exe 52->66         started        68 colorcpl.exe 54->68         started        116 Tries to detect virtualization through RDTSC time measurements 58->116 signatures20 process21 file22 86 C:\Users\user\AppData\Local\Temp\DB1, SQLite 60->86 dropped 156 Tries to harvest and steal browser information (history, passwords, etc) 60->156 70 conhost.exe 60->70         started        158 Modifies the context of a thread in another process (thread injection) 66->158 160 Maps a DLL or memory area into another process 66->160 162 Sample uses process hollowing technique 66->162 signatures23 process24
Threat name:
Script-BAT.Trojan.Heuristic
Status:
Malicious
First seen:
2024-02-09 04:50:22 UTC
File Type:
Text
AV detection:
6 of 36 (16.67%)
Threat level:
  2/5
Verdict:
malicious
Result
Malware family:
modiloader
Score:
  10/10
Tags:
family:formbook family:modiloader campaign:fd05 persistence rat spyware stealer trojan
Behaviour
Enumerates system info in registry
Modifies Internet Explorer settings
Runs ping.exe
Script User-Agent
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Launches sc.exe
Suspicious use of SetThreadContext
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Creates new service(s)
Formbook payload
ModiLoader Second Stage
Formbook
ModiLoader, DBatLoader
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:MALWARE_BAT_KoadicBAT
Author:ditekSHen
Description:Koadic post-exploitation framework BAT payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

DBatLoader

Batch (bat) bat 517e2fa5e107a458f382dce0def885aa44ef55749f75432811ff205e025e623e

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments