MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 58348cc94b984ca026fa0a319b93ac988a394ed3d5ec39c01c47a8e762ebdb16. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DBatLoader


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments

SHA256 hash: 58348cc94b984ca026fa0a319b93ac988a394ed3d5ec39c01c47a8e762ebdb16
SHA3-384 hash: 5d764df3575d572e5727d8d3b8c9ec77e6f7457f377c92435ac729795265db8060700b04869e20a09557abe1b5f1fb14
SHA1 hash: 9b9d500993f74ed975945419b6a25c03e80d8400
MD5 hash: c96743116088d21b52516f16f4866f69
humanhash: black-tennessee-video-friend
File name:USD470900_COPY_800BLHSBC882001.PDF.bat
Download: download sample
Signature DBatLoader
File size:3'383'372 bytes
First seen:2024-11-20 06:51:27 UTC
Last seen:Never
File type:Batch (bat) bat
MIME type:text/plain
ssdeep 24576:PdLbg3tuCmhfOs2TLie3m0nKaf5ohA87eR4xGVPTXJF7wb2l+qCWuj8lzoQjJpcp:PR03turhfwL8uJFlEoNZHk
Threatray 4'407 similar samples on MalwareBazaar
TLSH T1C4F5C8EB3EBD274E670433AF5F4FF555072FCC140A815ED844C609C8969A71B29A0EAE
Magika txt
Reporter abuse_ch
Tags:bat DBatLoader HSBC RemcosRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
95
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
USD470900_COPY_800BLHSBC882001.PDF.tar.gz
Verdict:
Malicious activity
Analysis date:
2024-11-19 14:31:41 UTC
Tags:
arch-exec rat remcos remote

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
delphi emotet
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
extrac32 lolbin masquerade
Result
Threat name:
Remcos, DBatLoader
Detection:
malicious
Classification:
bank.troj.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Detected Remcos RAT
Drops or copies certutil.exe with a different name (likely to bypass HIPS)
Drops or copies cmd.exe with a different name (likely to bypass HIPS)
Drops PE files to the user root directory
Drops PE files with a suspicious file extension
Early bird code injection technique detected
Found large BAT file
Found malware configuration
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Registers a new ROOT certificate
Sigma detected: DLL Search Order Hijackig Via Additional Space in Path
Sigma detected: Execution from Suspicious Folder
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: Remcos
Sigma detected: Suspicious Program Location with Network Connections
Suricata IDS alerts for network traffic
Uses an obfuscated file name to hide its real file extension (double extension)
Uses dynamic DNS services
Yara detected DBatLoader
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1559105 Sample: USD470900_COPY_800BLHSBC882... Startdate: 20/11/2024 Architecture: WINDOWS Score: 100 80 iamblessed.duckdns.org 2->80 82 ferreiragascuritiba.com.br 2->82 84 geoplugin.net 2->84 108 Suricata IDS alerts for network traffic 2->108 110 Found malware configuration 2->110 112 Malicious sample detected (through community Yara rule) 2->112 116 13 other signatures 2->116 9 cmd.exe 1 2->9         started        11 Faogvkgh.PIF 2->11         started        14 Faogvkgh.PIF 2->14         started        signatures3 114 Uses dynamic DNS services 80->114 process4 signatures5 16 AnyDesk.PIF 1 6 9->16         started        21 extrac32.exe 1 9->21         started        23 alpha.exe 1 9->23         started        29 5 other processes 9->29 118 Multi AV Scanner detection for dropped file 11->118 120 Early bird code injection technique detected 11->120 122 Machine Learning detection for dropped file 11->122 25 SndVol.exe 11->25         started        124 Allocates memory in foreign processes 14->124 27 SndVol.exe 14->27         started        process6 dnsIp7 72 ferreiragascuritiba.com.br 216.172.172.178, 49706, 49707, 80 UNIFIEDLAYER-AS-1US United States 16->72 56 C:\Users\Public\Libraries\Faogvkgh, data 16->56 dropped 58 C:\Users\Public\Faogvkgh.url, MS 16->58 dropped 86 Multi AV Scanner detection for dropped file 16->86 88 Early bird code injection technique detected 16->88 90 Machine Learning detection for dropped file 16->90 100 3 other signatures 16->100 31 cmd.exe 1 16->31         started        33 SndVol.exe 2 13 16->33         started        37 esentutl.exe 2 16->37         started        60 C:\Users\Public\alpha.exe, PE32+ 21->60 dropped 92 Drops PE files to the user root directory 21->92 94 Drops or copies certutil.exe with a different name (likely to bypass HIPS) 21->94 96 Drops or copies cmd.exe with a different name (likely to bypass HIPS) 21->96 40 kn.exe 3 2 23->40         started        98 Detected Remcos RAT 25->98 42 kn.exe 2 29->42         started        44 extrac32.exe 1 29->44         started        file8 signatures9 process10 dnsIp11 46 esentutl.exe 2 31->46         started        50 esentutl.exe 2 31->50         started        52 conhost.exe 31->52         started        74 iamblessed.duckdns.org 77.221.149.38, 47666, 49709 INFOBOX-ASInfoboxruAutonomousSystemRU Russian Federation 33->74 76 127.0.0.1 unknown unknown 33->76 78 geoplugin.net 178.237.33.50, 49710, 80 ATOM86-ASATOM86NL Netherlands 33->78 102 Detected Remcos RAT 33->102 62 C:\Users\Public\Libraries\Faogvkgh.PIF, PE32 37->62 dropped 54 conhost.exe 37->54         started        104 Registers a new ROOT certificate 40->104 106 Drops PE files with a suspicious file extension 40->106 64 C:\Users\Public\Libraries\AnyDesk.PIF, PE32 42->64 dropped 66 C:\Users\Public\kn.exe, PE32+ 44->66 dropped file12 signatures13 process14 file15 68 C:\Users\Public\alpha.pif, PE32 46->68 dropped 126 Drops PE files to the user root directory 46->126 128 Drops PE files with a suspicious file extension 46->128 130 Drops or copies cmd.exe with a different name (likely to bypass HIPS) 46->130 70 C:\Users\Public\xpha.pif, PE32 50->70 dropped signatures16
Threat name:
Script-BAT.Trojan.Remcos
Status:
Suspicious
First seen:
2024-11-19 13:21:02 UTC
File Type:
Text
Extracted files:
1
AV detection:
7 of 38 (18.42%)
Threat level:
  5/5
Result
Malware family:
modiloader
Score:
  10/10
Tags:
family:modiloader discovery persistence trojan
Behaviour
Script User-Agent
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
ModiLoader Second Stage
ModiLoader, DBatLoader
Modiloader family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BAT_DbatLoader
Author:NDA0E
Description:Detects base64 and hex encoded MZ header used by DbatLoader
Rule name:dbatloader_bat_v2
Author:RandomMalware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments