MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7f4f4ef2223cbbb0414aa57e69f04a88315727dc1ce91ca24e6d27bf6f936ef1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DBatLoader


Vendor detections: 10


Intelligence 10 IOCs YARA 2 File information Comments

SHA256 hash: 7f4f4ef2223cbbb0414aa57e69f04a88315727dc1ce91ca24e6d27bf6f936ef1
SHA3-384 hash: ede8342417db64011185ec0405c7a405e1ffd0ad08ecec454fd3e60c04820d2c3655565843722e2e4b2a903ff29c0999
SHA1 hash: 6b4e8261a744df1c34394d59f4af4639b7fa9aff
MD5 hash: 20225ea7321e77ce8fe1ef217f476ada
humanhash: network-minnesota-summer-table
File name:ORDER-REQUIRED-CONFIRMATION-OFFER.cmd
Download: download sample
Signature DBatLoader
File size:4'678'613 bytes
First seen:2025-02-14 11:33:17 UTC
Last seen:Never
File type:cmd cmd
MIME type:text/x-msdos-batch
ssdeep 49152:vnoPPqCrAARUf1i6arLjfYTHn4nnAGfr3u673y8t9kxSi:N
Threatray 3 similar samples on MalwareBazaar
TLSH T1EE2655B31FCC62D60702262A3637A87C9EFBEC758B815AF840C305B4DC4D55A775ACA6
Magika batch
Reporter JAMESWT_WT
Tags:cmd DBatLoader MassLogger NEOFX Spam-ITA

Intelligence


File Origin
# of uploads :
1
# of downloads :
132
Origin country :
IT IT
Vendor Threat Intelligence
Verdict:
Malicious
Score:
98.2%
Tags:
delphi emotet
Result
Verdict:
UNKNOWN
Result
Threat name:
DBatLoader, MassLogger RAT, PureLog Stea
Detection:
malicious
Classification:
bank.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates many large memory junks
Allocates memory in foreign processes
Antivirus detection for dropped file
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops or copies certutil.exe with a different name (likely to bypass HIPS)
Drops or copies cmd.exe with a different name (likely to bypass HIPS)
Drops PE files to the user root directory
Drops PE files with a suspicious file extension
Found malware configuration
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Registers a new ROOT certificate
Sample uses process hollowing technique
Sigma detected: DLL Search Order Hijackig Via Additional Space in Path
Sigma detected: Execution from Suspicious Folder
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: Suspicious Program Location with Network Connections
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected DBatLoader
Yara detected MassLogger RAT
Yara detected PureLog Stealer
Yara detected Telegram RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1615049 Sample: ORDER-REQUIRED-CONFIRMATION... Startdate: 14/02/2025 Architecture: WINDOWS Score: 100 72 reallyfreegeoip.org 2->72 74 lwaziacademy.com 2->74 76 2 other IPs or domains 2->76 98 Found malware configuration 2->98 100 Malicious sample detected (through community Yara rule) 2->100 102 Multi AV Scanner detection for dropped file 2->102 106 15 other signatures 2->106 10 cmd.exe 1 2->10         started        12 Dlevzsds.PIF 2->12         started        15 Dlevzsds.PIF 2->15         started        signatures3 104 Tries to detect the country of the analysis system (by using the IP) 72->104 process4 signatures5 17 rdha.pif 1 10->17         started        19 alpha.pif 1 10->19         started        22 expha.pif 1 10->22         started        29 7 other processes 10->29 130 Antivirus detection for dropped file 12->130 132 Writes to foreign memory regions 12->132 134 Allocates memory in foreign processes 12->134 25 sdszvelD.pif 12->25         started        136 Sample uses process hollowing technique 15->136 138 Allocates many large memory junks 15->138 27 sdszvelD.pif 15->27         started        process6 file7 31 ANYDESK.PIF 1 8 17->31         started        108 Uses ping.exe to sleep 19->108 110 Uses ping.exe to check the status of other devices and networks 19->110 35 ghf.pif 3 2 19->35         started        54 C:\Users\Public\alpha.pif, PE32+ 22->54 dropped 112 Drops PE files to the user root directory 22->112 114 Drops PE files with a suspicious file extension 22->114 116 Drops or copies certutil.exe with a different name (likely to bypass HIPS) 22->116 118 Drops or copies cmd.exe with a different name (likely to bypass HIPS) 22->118 120 Tries to steal Mail credentials (via file / registry access) 27->120 122 Tries to harvest and steal browser information (history, passwords, etc) 27->122 56 C:\Users\Public\rdha.pif, PE32+ 29->56 dropped 58 C:\Users\Public\ghf.pif, PE32+ 29->58 dropped 60 C:\Users\Public\expha.pif, PE32+ 29->60 dropped 37 PING.EXE 1 29->37         started        40 ghf.pif 2 29->40         started        signatures8 process9 dnsIp10 62 C:\Windows \SysWOW64\svchost.pif, PE32+ 31->62 dropped 64 C:\Windows \SysWOW6464ETUTILS.dll, PE32+ 31->64 dropped 66 C:\Users\Public\Libraries\sdszvelD.pif, PE32 31->66 dropped 70 3 other malicious files 31->70 dropped 86 Antivirus detection for dropped file 31->86 88 Drops PE files with a suspicious file extension 31->88 90 Writes to foreign memory regions 31->90 96 4 other signatures 31->96 42 sdszvelD.pif 15 2 31->42         started        46 cmd.exe 3 31->46         started        48 cmd.exe 1 31->48         started        92 Registers a new ROOT certificate 35->92 94 Drops PE files to the user root directory 35->94 78 127.0.0.1 unknown unknown 37->78 68 C:\Users\Public\ANYDESK.PIF, PE32 40->68 dropped file11 signatures12 process13 dnsIp14 80 checkip.dyndns.com 193.122.130.0, 49773, 49859, 49905 ORACLE-BMC-31898US United States 42->80 82 lwaziacademy.com 41.185.8.252, 49898, 49899, 49962 GridhostZA South Africa 42->82 84 reallyfreegeoip.org 104.21.64.1, 443, 49828, 49861 CLOUDFLARENETUS United States 42->84 124 Detected unpacking (changes PE section rights) 42->124 126 Detected unpacking (overwrites its own PE header) 42->126 128 Tries to steal Mail credentials (via file / registry access) 42->128 50 conhost.exe 46->50         started        52 conhost.exe 48->52         started        signatures15 process16
Threat name:
Script-BAT.Dropper.Heuristic
Status:
Malicious
First seen:
2025-02-14 11:34:07 UTC
File Type:
Text
Extracted files:
1
AV detection:
5 of 37 (13.51%)
Threat level:
  2/5
Result
Malware family:
modiloader
Score:
  10/10
Tags:
family:modiloader collection discovery persistence spyware stealer trojan
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Adds Run key to start application
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Downloads MZ/PE file
ModiLoader Second Stage
ModiLoader, DBatLoader
Modiloader family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BAT_DbatLoader
Author:NDA0E
Description:Detects base64 and hex encoded MZ header used by DbatLoader
Rule name:dbatloader_bat_v2
Author:RandomMalware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments