MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e8e4a4c7c5c593136058722cabe2d42631feffde95d923f5fd7020b0c7286f22. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DBatLoader


Vendor detections: 13


Intelligence 13 IOCs YARA 1 File information Comments

SHA256 hash: e8e4a4c7c5c593136058722cabe2d42631feffde95d923f5fd7020b0c7286f22
SHA3-384 hash: 09fedc4c79ff243cc983df2204fb7354b49bdcb3d2b2e99dc58da775140c4f3f19a65480837dcff8422964f626a2e0f6
SHA1 hash: a530781e06668750be976fe1ed545a3f43d833f3
MD5 hash: 9e78ed405e72f424f4f67d40a7c78857
humanhash: violet-texas-lactose-salami
File name:windows_update.bin
Download: download sample
Signature DBatLoader
File size:3'543'056 bytes
First seen:2022-06-26 18:24:10 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f416e9155047d7671b5125e4096b34d5 (1 x DBatLoader)
ssdeep 24576:h6I27w1KdkKRiCbm4LRYykRPCG0uy4aBKaYK+6koDbYW4c7IPsPWzEUAzgiBlkbw:h6DVYv6ft4odbRaG34nSqkbosa8
TLSH T1B7F56D617A05B5BFC06304F8ACC7D647627C7B91C208490BE77ABC7AF9A3CB656482D4
TrID 81.6% (.OCX) Windows ActiveX control (116521/4/18)
7.3% (.EXE) Win64 Executable (generic) (10523/12/4)
3.1% (.EXE) Win32 Executable (generic) (4505/5/1)
2.1% (.MZP) WinArchiver Mountable compressed Archive (3000/1)
1.4% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon bd78e0ebf2faee64 (1 x DBatLoader, 1 x RedLineStealer)
Reporter KdssSupport
Tags:DBatLoader exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
256
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
socelars
ID:
1
File name:
File.7z
Verdict:
Malicious activity
Analysis date:
2022-06-26 07:00:52 UTC
Tags:
evasion trojan socelars stealer opendir loader rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Searching for analyzing tools
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Unauthorized injection to a recently created process
Sending an HTTP GET request to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DBatLoader
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Disable Windows Defender real time protection (registry)
Found C&C like URL pattern
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Query firmware table information (likely to detect VMs)
Snort IDS alert for network traffic
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Yara detected DBatLoader
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Zapchast
Status:
Malicious
First seen:
2022-06-26 00:49:25 UTC
File Type:
PE (Exe)
Extracted files:
65
AV detection:
20 of 25 (80.00%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:djvu family:modiloader family:nymaim family:recordbreaker family:redline family:vidar botnet:1448 botnet:1501 botnet:3333 botnet:4 botnet:937 botnet:logsdiller cloud (telegram: @mr_golds) discovery evasion infostealer pyinstaller ransomware spyware stealer suricata themida trojan upx
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Detects Pyinstaller
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks whether UAC is enabled
Looks up external IP address via web service
Checks BIOS information in registry
Checks computer location settings
Modifies file permissions
Reads user/profile data of web browsers
Themida packer
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
Identifies VirtualBox via ACPI registry values (likely anti-VM)
ModiLoader Second Stage
Vidar Stealer
Detected Djvu ransomware
Djvu Ransomware
ModiLoader, DBatLoader
Modifies Windows Defender Real-time Protection settings
NyMaim
Process spawned unexpected child process
RecordBreaker
RedLine
RedLine Payload
Vidar
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved
suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer
suricata: ET MALWARE Win32/Filecoder.STOP Variant Request for Public Key
suricata: ET MALWARE Win32/Kelihos.F exe Download 2
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
suricata: ET MALWARE Win32/Vodkagats Loader Requesting Payload
Malware Config
C2 Extraction:
vedolevyle.xyz:80
https://t.me/tg_superch
https://climatejustice.social/@olegf9844
31.210.20.149
212.192.241.16
http://acacaca.org/test3/get.php
http://167.235.245.75/
89.22.235.145:36055
109.107.185.135:9303
Unpacked files
SH256 hash:
0b4b7d7628499c9d0c62562dc64f22baf5390cd32f71e0317c259511ae85b5b6
MD5 hash:
d6e8fb9c9383709a7475144fbc74cb44
SHA1 hash:
3dc32f98eb13d725511b64924730132883ad3591
SH256 hash:
e8e4a4c7c5c593136058722cabe2d42631feffde95d923f5fd7020b0c7286f22
MD5 hash:
9e78ed405e72f424f4f67d40a7c78857
SHA1 hash:
a530781e06668750be976fe1ed545a3f43d833f3
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_Themida
Author:ditekSHen
Description:Detects executables packed with Themida

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments