MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6555c0d7b9acbff665b84aec9164dd1cf01740a10e735791f25c28a5da830740. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DBatLoader


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 6555c0d7b9acbff665b84aec9164dd1cf01740a10e735791f25c28a5da830740
SHA3-384 hash: 9e1076a6e7133e0f4258ad819d781a9b6ffc4030fd7d35637c3792f9b4278dbdd0ce9db4c5dd0dae376d353a1ce115ca
SHA1 hash: aa64b3e925f0618d1aa39261acfc8195fbfa03db
MD5 hash: 1e121660325c2363e9ddd001019baaaa
humanhash: lithium-freddie-rugby-eleven
File name:SecuriteInfo.com.generic.ml.15187.4531
Download: download sample
Signature DBatLoader
File size:714'240 bytes
First seen:2022-08-18 02:28:38 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f9f8a4f5d6af22b8a5196d501f8619d8 (2 x DBatLoader, 2 x Formbook)
ssdeep 12288:vGJufSEN4Nb+cuuUkyFnhPTWT5OWZdavN2HuEGlemz5z:vGqN4Nb9SmL4Fvz
TLSH T15AE47D6E91F1C537C13A9E38CD5B92F8B9217DC12A18A8853FEA3F085B793416D1B172
TrID 51.9% (.EXE) InstallShield setup (43053/19/16)
17.0% (.EXE) Win32 Executable Delphi generic (14182/79/4)
15.7% (.SCR) Windows screen saver (13101/52/3)
5.4% (.EXE) Win32 Executable (generic) (4505/5/1)
2.4% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon 27d0d8d4d4d8f007 (5 x RemcosRAT, 5 x DBatLoader, 4 x FormBook)
Reporter SecuriteInfoCom
Tags:DBatLoader exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
300
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
SecuriteInfo.com.generic.ml.15187.4531
Verdict:
Malicious activity
Analysis date:
2022-08-18 02:29:18 UTC
Tags:
installer remcos

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm keylogger
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DBatLoader
Detection:
malicious
Classification:
troj
Score:
60 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected DBatLoader
Behaviour
Behavior Graph:
Threat name:
Win32.Exploit.BypassUac
Status:
Malicious
First seen:
2022-08-17 23:35:46 UTC
File Type:
PE (Exe)
Extracted files:
80
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
Result
Malware family:
Score:
  10/10
Tags:
family:modiloader family:remcos botnet:remotehost collection persistence rat trojan
Behaviour
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Adds Run key to start application
NirSoft MailPassView
Nirsoft
ModiLoader, DBatLoader
Remcos
Malware Config
C2 Extraction:
dash.3utilities.com:2404
dash1.3utilities.com:2404
dash2.ddns.net:2404
bash.mywire.org:2404
bash1.accesscam.org:2404
dash3.ddns.net:2404
dash4.ddns.net:2404
bash2.accessscam.org:2404
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments