BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details

DBatLoader

51
Global rank
62 infographic chevron month
Month rank
52 infographic chevron week
Week rank
1375
IOCs

DBatLoader is a loader malware used for distributing payloads of different types, including WarzoneRAT and Formbook. It is employed in multi-stage attacks that usually start with a phishing email carrying a malicious attachment.

Loader
Type
Unknown
Origin
1 June, 2020
First seen
26 July, 2024
Last seen

How to analyze DBatLoader with ANY.RUN

Type
Unknown
Origin
1 June, 2020
First seen
26 July, 2024
Last seen

IOCs

IP addresses
20.206.228.177
20.252.43.59
40.74.95.186
Hashes
e08e4eb8aed0ba0a861e34391114375bdaf9e958f881819760edd0f09addcb04
1acecc1f245ab45378418be82fc87c3742529ded1d291c7dd08c04136b6be1fb
0f60fc14fbbcb3edc807f91686c3818cddd8fe5dc1a3ce736c8d7c37c9f71a17
bc6ad0214e356e543684e62a978f0a9c64bbe3282b2d11f31243e7dbde017664
56a3dc5c90ade897e349ba0fd0433770dcdda32b5bd2a1c6608b2af2f9b34c05
57a6fd170a2ee29a87445ca95cd6e28d976930863a4ad972e9f6bc57a17b5ba8
6d2399b13a176bbb2b4319d7fc405de5078f1ded3bb0653f8111e79a3f0ab885
4b45c80c13d9143811cacdda64ac2e4cab04fe6262e16cb813836fd244ff5b9c
4f1e9fb055d2edf64a82cd342bb580f3f1a2f7a2351ac8a2cddc25120bb726ac
601f1968151fb5f90e8d384191b0fdbec71610904f6df0aea777ddd33d28ab3e
be5a1d27153819f4c4eb1c96efb064deee2cf91d3cb7494377cc16adbe51e2e7
f78db900fda53959f9be60c05310fe73bbe076e86b6baa1dac07c3b91aa9daa3
7493802b7d5399d82e9560c1ebab736dcf5cc1b64416662475141aea422dae90
2f1ca9ea9c439cddf83672896fe9810ce3d3aa2218f3718f121e90a19e3a25e6
a5a59f52e63c24844e8ecc87e8484d34b5b38edc57a1d1afd508eb6591477723
118694050782393f185308536607845d4730377b6d9aa2dbe49c1e1e95fedfe6
f180011d40fc0260dd37b00ae8bc67f68e620f161b978850ddad9208790ebe21
58fb3fb48ef9fad1b1db3d84e7319e3536ada43191282424b436d2b426dcff30
052e1b54c491c63c662fa47b08b71ba2f2c25bbb20bca619893785b87f90257d
bfbb98db537fe8087d974d010f9a31369d755923b3eebffb1658af396769ff2d
Domains
unilateralcospilino.duckdns.org
setimetntalatsuirity.ddnsfree.com
willanime.com
chronotech.online
cybertechglobalai.com
cremation-services-98621.bond
druk.site
bottles2bags.com
chatlhh5.com
assabmould.net
8363k.vip
data-analytics-78756.bond
de-guru.com
cnwsjd.cfd
dingshenghr.net
aeroportlogistics.com
601234.net
323va.com
ecodfairs.top
easyhealthconsulting.com
URLs
https://aarzoomarine.com/wp-content/253_Kqxdlqydhpt
https://1021.filemail.com/api/file/get
https://onedrive.live.com/download?resid=F2DC8284E0A31E9E%21191&authkey=!AMs9a0Jkay0zupc
https://onedrive.live.com/download?resid=E0CF7F9E6AAF27EF%211698&authkey=!AP2ndiARY9jfQNI
https://morientlines.com/xerofileupshsgdydpdfseudidofndhehuplosdsdocumentghy/Scxozmyplhmqutylctxlkglsugzstqx
https://2012.filemail.com/api/file/get
https://onedrive.live.com/download?resid=80A2C2010B1BCE07%211238&authkey=!AKCIqpe5wN0S2p0
https://onedrive.live.com/download?resid=38773C188FECDED2%21107&authkey=!APdTZ0yd8fEkIVs
https://onedrive.live.com/download?resid=8B41338C16482EC%21119&authkey=!AM1EpmNihNYEsQs
https://graffae-my.sharepoint.com/:u:/g/personal/estimator_graff_ae/EXU3ymcTlx9HkiSUJwzwH6gBi8hbq87jnAmkgUUdytHBOQ
https://onedrive.live.com/download?resid=BAF30C9243AC3050%21113&authkey=!AL1F5Ls5tRUL_Zc
https://onedrive.live.com/download?resid=FDB0512DE793B32E%21201&authkey=!AKqy7NQ0hsusk7U
https://onedrive.live.com/download?resid=849ABDB14CA5CEC3%21268&authkey=!AGkSae3yLjJ6J50
https://balkancelikdovme.com/work/Elpuxpkilck
https://kamix.hu/255_Gosyggcgyxx
https://onedrive.live.com/download?resid=BB56EEF50A3B985F%21233&authkey=!AIlQkZsq62t1AmQ
http://baitalasma.com/255_Pzuhzgxzrfq
https://onedrive.live.com/download?resid=F0B00474923735E9%21107&authkey=!AC1EYVyMZoYGdi83
https://hosting.tempauto.ru/255_Fusgwewdxqx
https://onedrive.live.com/download?resid=1F8C7ECD28951B19%21157&authkey=!APh_0e2G4FcIgbc
Last Seen at

Recent blog posts

post image
See Malicious Process Relationships on a Vis...
watchers 178
comments 0
post image
Brute Ratel C4 Badger Used to Load Latrodectu...
watchers 1013
comments 0
post image
Find Threats Exploiting CrowdStrike Outage w...
watchers 3000
comments 0

What is DBatLoader malware?

DBatLoader is a loader written in Delphi that has been in extensive use among attackers since 2020. One of the key features of the malware is its reliance on legitimate cloud-based platforms such as Discord for hosting its payloads. DBatLoader has been involved in numerous campaigns and leveraged to deploy stealers, trojans, and other threats.

In most cases, DBatLoader manages to infect machines via multi-stage attacks. For instance, victims may receive an email attachment in the form of a PDF file. Upon opening the attachment, users may be prompted to click on a seemingly genuine button embedded with a malicious link. Clicking this link will initiate the download of a Windows Cabinet file, which, in turn, will trigger the installation of DBatLoader on the unsuspecting user's computer.

Get started today for free

Easily analyze emerging malware with ANY.RUN interactive online sandbox

Register for free

Technical details of the DBatLoader malicious software

DBatLoader’s sole purpose is to distribute other malware on the devices it manages to infect. To do this, the developers behind DBatLoader have equipped their malicious software with several advanced capabilities.

For example, DBatLoader can avoid User Account Control (UAC) to gain elevated privileges. It does this by exploiting the mock folder vulnerability. In Windows, executables launched from certain system directories can auto-elevate. DBatLoader exploits this by creating a mock folder with the same name as a trusted location, such as "C:\Windows\System32 ".

On top of that, DBatLoader copies a legitimate process to this fake folder and then injects it with its malicious DLL that allows the payload downloaded by DBatLoader to execute freely without any security notifications, achieving sustained persistence.

Another common vulnerability abused by DBatLoader in previous attacks was CVE-2018-0798, an exploit targeting Equation Editor in Microsoft Office. The malware has also been observed to utilize steganography.

As mentioned, DBatLoader is usually configured to pull malicious payloads from servers of popular cloud storage services, including Microsoft OneDrive and Google Drive. Some of the notable examples of malware dropped by DBatLoader are Formbook, Warzone, and Remcos.

Execution process of DBatLoader

In order to detect DBatLoader, it is vital to analyze the latest samples of this malware and collect up-to-date information on it. To this end, we can use ANY.RUN, a malware analysis sandbox that lets us quickly analyze any suspicious file or link to spot threats.

Let’s upload a sample of DBatLoader to ANY.RUN and study its behavior.

In this task, DBatLoader was distributed as an executable file with a name mimicking the title of a document, attempting to trick users into opening the file and executing the malicious code. Upon execution, DBatLoader downloads and injects the Formbook malware into the Control and Explorer system processes, enabling its malicious activity.

Analyze malware for free in a fully interactive cloud sandbox – sign up now!

DBatLoader process tree shown in ANY.RUN DBatLoader's process tree demonstrated in ANY.RUN

In addition, this loader can be used in more sophisticated attacks, such as exploiting vulnerabilities to penetrate the system. These can be familiar vulnerabilities like CVE-2017-11882, as well as lesser known ones. On top of that, DBatLoader can also make use of system utilities in its attacks. In this task, a whole arsenal of system utilities is actively used, such as cmd, ping, and xcopy, including for the purpose of lateral movement. Eventually, DBatLoader drops Remcos that instantly begins its operation.

Distribution methods of the DBatLoader malware

Phishing campaigns constitute the most common vector of attack involving DBatLoader. Emails sent by the operators of the malware target different organizations and are masqueraded as genuine messages. In many cases, criminals even use legitimate email addresses they manage to hijack or gain access to.

The subject of such emails concerns different business-related matters, such as payments and other arrangements. For example, attackers may send fake invoices as Microsoft Office or PDF files. These files usually contain a link that, once clicked, can trigger the infection leading to DBatLoader being dropped on the computer and the eventual deployment of the final payload.

Conclusion

DBatLoader remains an active threat commonly used by criminals in their attacks on various types of organizations. To keep your infrastructure safe, it is essential that you have strong security measures in place, especially when it comes to software for detecting and inspecting threats.

Use the ANY.RUN sandbox as a reliable tool for analyzing emails you receive to safely determine if they pose any danger. ANY.RUN’s interactive cloud environment makes it easy to investigate the most advanced phishing campaigns and uncover multi-stage attacks in minutes. The service provides you with convenient text reports containing all the relevant information on the files and links you submit, including fresh IOCs.

Try ANY.RUN for free – request a demo!

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More