MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7d75d4b4861ce4669ee9245e8ee7c141eb9b9f56fb6fdcabf9a295ff36498a47. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DBatLoader


Vendor detections: 16


Intelligence 16 IOCs YARA 3 File information Comments

SHA256 hash: 7d75d4b4861ce4669ee9245e8ee7c141eb9b9f56fb6fdcabf9a295ff36498a47
SHA3-384 hash: d9b9c009ab12dc59f110746a3e3c5be0ffe2800d381963aaa5685314ecdc950f5892c301fe0b4cf1b0dd2608106ae6e9
SHA1 hash: f25e4f7f4d6e79a368f7dcbf02f6ae9f7df012b1
MD5 hash: f900583508c284059608aceb44dc26b3
humanhash: kentucky-two-harry-march
File name:Dwtkbuwxlttdpq.exe
Download: download sample
Signature DBatLoader
File size:2'403'840 bytes
First seen:2023-12-03 16:28:26 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 68296516c32d32fc3260fa762049f34e (5 x DBatLoader, 1 x Formbook)
ssdeep 49152:UkQzWGa8pH8yc0/wU2lpe63ZrxKrVEbRIqiPt41tFehg1mQ5C:UNqGa8pcyV/wjpdZrxEVEtI14Vqn
Threatray 3'095 similar samples on MalwareBazaar
TLSH T135B5F111D5A18437D0B71B37894B6F78A8292DD4AF28B4C1F2EA7C8CB67834537251FA
TrID 86.8% (.EXE) Win32 Executable Borland Delphi 6 (262638/61)
4.6% (.EXE) Win32 Executable Delphi generic (14182/79/4)
4.3% (.SCR) Windows screen saver (13097/50/3)
1.4% (.EXE) Win32 Executable (generic) (4505/5/1)
0.6% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon 0f1c94d4d674bc5d (10 x DBatLoader, 2 x RemcosRAT, 1 x Formbook)
Reporter abuse_ch
Tags:DBatLoader exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
301
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Sending a custom TCP request
Running batch commands
Creating a process with a hidden window
Launching a process
Unauthorized injection to a system process
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control hook keylogger lolbin packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Remcos, DBatLoader
Detection:
malicious
Classification:
rans.phis.troj.spyw.expl.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates many large memory junks
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to bypass UAC (CMSTPLUA)
Contains functionality to inject code into remote processes
Contains functionality to modify clipboard data
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
DLL side loading technique detected
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with a suspicious file extension
Early bird code injection technique detected
Found malware configuration
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Remcos
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses dynamic DNS services
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected DBatLoader
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1352662 Sample: Dwtkbuwxlttdpq.exe Startdate: 03/12/2023 Architecture: WINDOWS Score: 100 75 dksak.ddns.net 2->75 77 web.fe.1drv.com 2->77 79 4 other IPs or domains 2->79 87 Found malware configuration 2->87 89 Malicious sample detected (through community Yara rule) 2->89 91 Antivirus detection for URL or domain 2->91 95 9 other signatures 2->95 12 Dwtkbuwxlttdpq.exe 1 7 2->12         started        16 Dwtkbuwx.PIF 2->16         started        signatures3 93 Uses dynamic DNS services 75->93 process4 file5 69 C:\Users\Public\Libraries\netutils.dll, PE32+ 12->69 dropped 71 C:\Users\Public\Libraries\easinvoker.exe, PE32+ 12->71 dropped 73 C:\Users\Public\Libraries\Dwtkbuwx.PIF, PE32 12->73 dropped 125 Early bird code injection technique detected 12->125 127 Drops PE files with a suspicious file extension 12->127 129 Allocates memory in foreign processes 12->129 131 Queues an APC in another process (thread injection) 12->131 18 colorcpl.exe 3 16 12->18         started        23 cmd.exe 1 12->23         started        133 Multi AV Scanner detection for dropped file 16->133 135 Machine Learning detection for dropped file 16->135 25 colorcpl.exe 16->25         started        signatures6 process7 dnsIp8 81 dksak.ddns.net 198.244.160.125, 3835, 49723, 49725 RIDLEYSD-NETUS United States 18->81 83 geoplugin.net 178.237.33.50, 49726, 80 ATOM86-ASATOM86NL Netherlands 18->83 63 C:\ProgramData\remcos\logs.dat, data 18->63 dropped 101 Contains functionality to bypass UAC (CMSTPLUA) 18->101 103 Contains functionalty to change the wallpaper 18->103 105 Contains functionality to steal Chrome passwords or cookies 18->105 115 8 other signatures 18->115 27 colorcpl.exe 18->27         started        30 colorcpl.exe 18->30         started        32 colorcpl.exe 18->32         started        42 6 other processes 18->42 107 Uses ping.exe to sleep 23->107 109 Drops executables to the windows directory (C:\Windows) and starts them 23->109 111 Uses ping.exe to check the status of other devices and networks 23->111 34 easinvoker.exe 23->34         started        36 PING.EXE 1 23->36         started        39 xcopy.exe 2 23->39         started        44 8 other processes 23->44 113 DLL side loading technique detected 25->113 file9 signatures10 process11 dnsIp12 119 Tries to steal Instant Messenger accounts or passwords 27->119 121 Tries to steal Mail credentials (via file / registry access) 27->121 123 Tries to harvest and steal browser information (history, passwords, etc) 30->123 46 Dwtkbuwx.PIF 34->46         started        49 cmd.exe 1 34->49         started        85 127.0.0.1 unknown unknown 36->85 65 C:\Windows \System32\easinvoker.exe, PE32+ 39->65 dropped 67 C:\Windows \System32\netutils.dll, PE32+ 44->67 dropped file13 signatures14 process15 signatures16 137 Early bird code injection technique detected 46->137 139 Allocates memory in foreign processes 46->139 141 Allocates many large memory junks 46->141 51 colorcpl.exe 46->51         started        143 Adds a directory exclusion to Windows Defender 49->143 54 cmd.exe 1 49->54         started        56 conhost.exe 49->56         started        process17 signatures18 97 DLL side loading technique detected 51->97 99 Adds a directory exclusion to Windows Defender 54->99 58 powershell.exe 27 54->58         started        process19 signatures20 117 DLL side loading technique detected 58->117 61 conhost.exe 58->61         started        process21
Threat name:
Win32.Trojan.ModiLoader
Status:
Malicious
First seen:
2023-11-29 13:43:09 UTC
File Type:
PE (Exe)
Extracted files:
30
AV detection:
27 of 37 (72.97%)
Threat level:
  5/5
Result
Malware family:
modiloader
Score:
  10/10
Tags:
family:modiloader trojan
Behaviour
ModiLoader Second Stage
ModiLoader, DBatLoader
Unpacked files
SH256 hash:
7bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301
MD5 hash:
c116d3604ceafe7057d77ff27552c215
SHA1 hash:
452b14432fb5758b46f2897aeccd89f7c82a727d
SH256 hash:
a331133cccade7ee2b6029a043b56f3d2bddbe91f8e9cc24116df60b568ab81d
MD5 hash:
910b0582f4cae6379545c9063a00c0a4
SHA1 hash:
26bfab9a226f975d4882e3b9279ca09b5c09d9f5
Detections:
win_dbatloader_g1 MALWARE_Win_ModiLoader
SH256 hash:
7d75d4b4861ce4669ee9245e8ee7c141eb9b9f56fb6fdcabf9a295ff36498a47
MD5 hash:
f900583508c284059608aceb44dc26b3
SHA1 hash:
f25e4f7f4d6e79a368f7dcbf02f6ae9f7df012b1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BobSoftMiniDelphiBoBBobSoft
Author:malware-lu
Rule name:Borland
Author:malware-lu
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments