MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5aaf1bad66c12e29fd6c096f82876d8f13f585eb8cdd1c6667f99eac630e031e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DBatLoader


Vendor detections: 10


Intelligence 10 IOCs YARA 13 File information Comments

SHA256 hash: 5aaf1bad66c12e29fd6c096f82876d8f13f585eb8cdd1c6667f99eac630e031e
SHA3-384 hash: 641c6a80dd661162415c2c4cedc3ee5a0dd4d1e39578423f0dd0019d11e0ff0941e1bc183aa10b1a7ee2d367637f1852
SHA1 hash: 8646c18fc74edca6341e915dd06997149e5d019b
MD5 hash: 6aca6c9fdf82b87557148999d0b08296
humanhash: twenty-bacon-oklahoma-tennis
File name:SWIFT_COPY20240604.cmd
Download: download sample
Signature DBatLoader
File size:3'714'343 bytes
First seen:2024-06-19 06:57:24 UTC
Last seen:Never
File type:cmd cmd
MIME type:text/x-msdos-batch
ssdeep 49152:GA6PFw42qcCUt5GKGhqK6GgCYUMCJwUzun2vHMA:i
Threatray 9 similar samples on MalwareBazaar
TLSH T182061DB729AD1E4E9309E75BF64BF9B4061EC8305A825E88C0C6CF88453E6DF2D50D6D
Reporter Racco42
Tags:cmd DBatLoader

Intelligence


File Origin
# of uploads :
1
# of downloads :
98
Origin country :
Vendor Threat Intelligence
Verdict:
Malicious
Score:
90.9%
Tags:
Encryption Execution Network
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
extrac32 lolbin masquerade
Result
Verdict:
MALICIOUS
Result
Threat name:
DBatLoader
Detection:
malicious
Classification:
bank.troj.evad
Score:
100 / 100
Signature
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to detect sleep reduction / modifications
Drops or copies certutil.exe with a different name (likely to bypass HIPS)
Drops or copies cmd.exe with a different name (likely to bypass HIPS)
Drops PE files to the user root directory
Drops PE files with a suspicious file extension
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Registers a new ROOT certificate
Sigma detected: Execution from Suspicious Folder
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: Suspicious Program Location with Network Connections
Yara detected DBatLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1459481 Sample: SWIFT_COPY20240604.cmd Startdate: 19/06/2024 Architecture: WINDOWS Score: 100 37 imz.hongsbelt.co 2->37 39 youtube-ui.l.google.com 2->39 41 www.youtube.com 2->41 47 Found malware configuration 2->47 49 Yara detected DBatLoader 2->49 51 C2 URLs / IPs found in malware configuration 2->51 53 4 other signatures 2->53 8 cmd.exe 1 2->8         started        signatures3 process4 process5 10 Audio.pif 8->10         started        14 extrac32.exe 1 8->14         started        17 alpha.exe 1 8->17         started        19 5 other processes 8->19 dnsIp6 43 imz.hongsbelt.co 94.156.66.208, 49731, 49732, 80 TERASYST-ASBG Bulgaria 10->43 45 youtube-ui.l.google.com 142.250.185.238, 443, 49733 GOOGLEUS United States 10->45 59 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 10->59 61 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 10->61 63 Contains functionality to detect sleep reduction / modifications 10->63 21 WerFault.exe 2 16 10->21         started        35 C:\Users\Public\alpha.exe, PE32+ 14->35 dropped 65 Drops PE files to the user root directory 14->65 67 Drops or copies certutil.exe with a different name (likely to bypass HIPS) 14->67 69 Drops or copies cmd.exe with a different name (likely to bypass HIPS) 14->69 23 kn.exe 3 2 17->23         started        26 kn.exe 2 19->26         started        29 extrac32.exe 1 19->29         started        file7 signatures8 process9 file10 55 Registers a new ROOT certificate 23->55 57 Drops PE files with a suspicious file extension 23->57 31 C:\Users\Public\Libraries\Audio.pif, PE32 26->31 dropped 33 C:\Users\Public\kn.exe, PE32+ 29->33 dropped signatures11
Threat name:
Script-BAT.Trojan.Heuristic
Status:
Malicious
First seen:
2024-06-19 03:32:21 UTC
File Type:
Text
Extracted files:
1
AV detection:
11 of 24 (45.83%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Script User-Agent
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious use of WriteProcessMemory
Program crash
Executes dropped EXE
Loads dropped DLL
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:without_attachments
Author:Antonio Sanchez <asanchez@hispasec.com>
Description:Rule to detect the no presence of any attachment
Reference:http://laboratorio.blogs.hispasec.com/
Rule name:with_urls
Author:Antonio Sanchez <asanchez@hispasec.com>
Description:Rule to detect the presence of an or several urls
Reference:http://laboratorio.blogs.hispasec.com/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

DBatLoader

cmd cmd 5aaf1bad66c12e29fd6c096f82876d8f13f585eb8cdd1c6667f99eac630e031e

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments