MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 782c744d60224b5741c4befb318403d69928f9c036c1a437ad4e91b8106be79f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DBatLoader


Vendor detections: 7


Intelligence 7 IOCs YARA 3 File information Comments

SHA256 hash: 782c744d60224b5741c4befb318403d69928f9c036c1a437ad4e91b8106be79f
SHA3-384 hash: c9f55c0b9e2ca0bc9160959d03181abd987ed91cd91cce9ed39b6961339938d9249f78126d1f1293593cc67911abf201
SHA1 hash: 8058dc7e2052693256bb7846e9a28b24b46f48d3
MD5 hash: 0460335bf4eea90328b77f2141711138
humanhash: diet-nuts-vermont-sixteen
File name:Engine Parts List_pdf.rar
Download: download sample
Signature DBatLoader
File size:870'349 bytes
First seen:2023-08-30 20:44:09 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 24576:G8uoXpZSyFtgRZYBjY6eAfSeK5E0ApOGJjTfLcwbJPv:go+yFtgRZYBjYYK5NAkGBEwbJPv
TLSH T19F05331830921579B3D73A31C62AD9031CAE2F6933E21386479E5B32CD9F7B68C5789D
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Reporter cocaman
Tags:DBatLoader rar RFQ


Avatar
cocaman
Malicious email (T1566.001)
From: "Mohammad Asif <info@turbozakat.com>" (likely spoofed)
Received: "from turbozakat.com (ip244.ip-15-204-36.us [15.204.36.244]) "
Date: "29 Aug 2023 21:32:50 -0700"
Subject: "RE: Al-Rasheed RFQ-5087-22-2023"
Attachment: "Engine Parts List_pdf.rar"

Intelligence


File Origin
# of uploads :
1
# of downloads :
88
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:Udcwixynfdafuo.exe
File size:1'469'440 bytes
SHA256 hash: d3f1d0c0e37e33ad600d209bd43d61a3e94b6bd2a5d87b63c53184d070ee1680
MD5 hash: 939d9e4948d9c326714a149720ab26af
MIME type:application/x-dosexec
Signature DBatLoader
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control greyware keylogger lolbin packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.ModiLoader
Status:
Malicious
First seen:
2023-08-30 04:05:19 UTC
File Type:
Binary (Archive)
Extracted files:
35
AV detection:
14 of 36 (38.89%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BobSoftMiniDelphiBoBBobSoft
Author:malware-lu
Rule name:Borland
Author:malware-lu
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

DBatLoader

rar 782c744d60224b5741c4befb318403d69928f9c036c1a437ad4e91b8106be79f

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments