MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 868e3a9f49c41cd1823e765cc8d2e97453ada6baac959e58187e1a337db01b96. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DBatLoader


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 868e3a9f49c41cd1823e765cc8d2e97453ada6baac959e58187e1a337db01b96
SHA3-384 hash: 0f2ee86e8114708847e362f9c62f60960296d8cc87f67b3eb2254972715ac4b05a1c490d13d8db7431489395f7400567
SHA1 hash: 3c75ed7a5fdee7d8e6025a221d64b12cb2ab9ab0
MD5 hash: 3b72bfebf7e023618dae4a3703322c31
humanhash: victor-bakerloo-butter-avocado
File name:RFQ_0029388827772_Square General Contracting.exe
Download: download sample
Signature DBatLoader
File size:858'624 bytes
First seen:2022-08-08 08:10:27 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash cc1fadbd23c2bfd0a0322aa7e67d1d3f (4 x DBatLoader, 3 x Formbook, 1 x RemcosRAT)
ssdeep 12288:PmhCsMYEubn0UsjX4gaYv+tdqw1xBXEtFSOUHU3PiyMcCd5sY3nk1Jo:KnMYEbTjfaxtdqQVESreixHfk1G
TLSH T1D60538A162B899B3F11D2D37D89DCF5D1DA07E281939005EF6973AC8D93F2C2E4291D2
TrID 33.3% (.SCR) Windows screen saver (13101/52/3)
26.8% (.EXE) Win64 Executable (generic) (10523/12/4)
11.4% (.EXE) Win32 Executable (generic) (4505/5/1)
7.6% (.MZP) WinArchiver Mountable compressed Archive (3000/1)
5.2% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon 74fcd4c2c4c4c0d4 (4 x Formbook, 3 x NanoCore, 2 x AgentTesla)
Reporter 0xToxin
Tags:DBatLoader exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
324
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
RFQ_0029388827772_Square General Contracting.exe
Verdict:
Malicious activity
Analysis date:
2022-08-08 08:12:53 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Launching the process to interact with network services
Launching a process
Using the Windows Management Instrumentation requests
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckScreenResolution
CheckCmdLine
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
greyware keylogger packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
NetWire
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Connects to many ports of the same IP (likely port scanning)
Creates a thread in another existing process (thread injection)
Found evasive API chain (may stop execution after checking mutex)
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Injects a PE file into a foreign processes
Multi AV Scanner detection for domain / URL
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected NetWire RAT
Yara detected UAC Bypass using ComputerDefaults
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 680259 Sample: RFQ_0029388827772_Square Ge... Startdate: 08/08/2022 Architecture: WINDOWS Score: 100 57 Multi AV Scanner detection for domain / URL 2->57 59 Antivirus detection for dropped file 2->59 61 Icon mismatch, binary includes an icon from a different legit application in order to fool users 2->61 63 4 other signatures 2->63 8 RFQ_0029388827772_Square General Contracting.exe 1 24 2->8         started        13 Sdvfknogb.exe 13 2->13         started        15 Sdvfknogb.exe 13 2->15         started        process3 dnsIp4 47 greenenergies.pk 65.21.166.30, 443, 49733, 49734 CP-ASDE United States 8->47 49 192.168.2.1 unknown unknown 8->49 41 C:\Users\Public\Libraries\Sdvfknogb.exe, PE32 8->41 dropped 43 C:\Users\Public\Libraries\SdvfknogbO.bat, ASCII 8->43 dropped 45 C:\Users\...\Sdvfknogb.exe:Zone.Identifier, ASCII 8->45 dropped 65 Writes to foreign memory regions 8->65 67 Allocates memory in foreign processes 8->67 69 Creates a thread in another existing process (thread injection) 8->69 71 Injects a PE file into a foreign processes 8->71 17 cmd.exe 1 8->17         started        20 cmd.exe 1 8->20         started        22 cmd.exe 1 13->22         started        24 cmd.exe 1 15->24         started        file5 signatures6 process7 signatures8 55 Found evasive API chain (may stop execution after checking mutex) 17->55 26 cmd.exe 1 17->26         started        29 conhost.exe 17->29         started        31 conhost.exe 20->31         started        33 conhost.exe 22->33         started        35 conhost.exe 24->35         started        process9 dnsIp10 51 pentester01.duckdns.org 197.211.61.51, 52048 globacom-asNG Nigeria 26->51 53 pentester0.accesscam.org 158.69.134.53, 61869 OVHFR Canada 26->53 37 WerFault.exe 23 9 26->37         started        39 conhost.exe 26->39         started        process11
Threat name:
Win32.Trojan.Injuke
Status:
Malicious
First seen:
2022-08-08 08:11:09 UTC
File Type:
PE (Exe)
Extracted files:
60
AV detection:
19 of 26 (73.08%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
modiloader
Score:
  10/10
Tags:
family:modiloader persistence trojan
Behaviour
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Adds Run key to start application
Checks computer location settings
Blocklisted process makes network request
ModiLoader, DBatLoader
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments