MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c2062d2d3ac3815d7a050a1bfb261c98581e7398f8b0c7ca670d7ddb328611d2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DBatLoader


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: c2062d2d3ac3815d7a050a1bfb261c98581e7398f8b0c7ca670d7ddb328611d2
SHA3-384 hash: 21311b04ac7b05f2559ae69b19313d4f76fc7d856cbb4fee06fd1d0fe98368af9da838fb1380b7f92baebf4e76ceb8a6
SHA1 hash: a165284d29f69da7a05568e1733d4f6899333ce6
MD5 hash: d13b93eb2e0785ef6faeec7910d61ae5
humanhash: triple-earth-uranus-robin
File name:AVISO DE TRANSFERENCIA.exe
Download: download sample
Signature DBatLoader
File size:714'752 bytes
First seen:2022-08-19 08:16:11 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f9f8a4f5d6af22b8a5196d501f8619d8 (2 x DBatLoader, 2 x Formbook)
ssdeep 12288:vGJufSEN4Nb+cuuUkyFnhPTWT5OWZdavN2HuEGlemz5z:vGqN4Nb9SmL4Fvz
Threatray 876 similar samples on MalwareBazaar
TLSH T1F0E47BAD52B1D133D13A5E38DD1752F8B9217DD0292868C67FEA3E092FB96806C1B173
TrID 51.9% (.EXE) InstallShield setup (43053/19/16)
17.0% (.EXE) Win32 Executable Delphi generic (14182/79/4)
15.7% (.SCR) Windows screen saver (13101/52/3)
5.4% (.EXE) Win32 Executable (generic) (4505/5/1)
2.4% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon 27d0d8d4d4d8f007 (5 x RemcosRAT, 5 x DBatLoader, 4 x FormBook)
Reporter TeamDreier
Tags:DBatLoader exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
300
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
AVISO DE TRANSFERENCIA.exe
Verdict:
Suspicious activity
Analysis date:
2022-08-19 08:21:05 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Sending a custom TCP request
DNS request
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Searching for the window
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm keylogger overlay
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DBatLoader
Detection:
malicious
Classification:
troj
Score:
60 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected DBatLoader
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Tnega
Status:
Malicious
First seen:
2022-08-19 03:11:41 UTC
File Type:
PE (Exe)
Extracted files:
80
AV detection:
23 of 26 (88.46%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Modifies system certificate store
Suspicious use of WriteProcessMemory
Program crash
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

DBatLoader

Executable exe c2062d2d3ac3815d7a050a1bfb261c98581e7398f8b0c7ca670d7ddb328611d2

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments