BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details

DBatLoader

50
Global rank
11 infographic chevron month
Month rank
9 infographic chevron week
Week rank
1345
IOCs

DBatLoader is a loader malware used for distributing payloads of different types, including WarzoneRAT and Formbook. It is employed in multi-stage attacks that usually start with a phishing email carrying a malicious attachment.

Loader
Type
Unknown
Origin
1 June, 2020
First seen
27 April, 2024
Last seen

How to analyze DBatLoader with ANY.RUN

Type
Unknown
Origin
1 June, 2020
First seen
27 April, 2024
Last seen

IOCs

IP addresses
20.252.43.59
172.232.172.123
20.206.228.177
40.74.95.186
Hashes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unilateralcospilino.duckdns.org
setimetntalatsuirity.ddnsfree.com
willanime.com
chronotech.online
cybertechglobalai.com
cremation-services-98621.bond
druk.site
bottles2bags.com
chatlhh5.com
assabmould.net
8363k.vip
data-analytics-78756.bond
de-guru.com
cnwsjd.cfd
dingshenghr.net
aeroportlogistics.com
601234.net
323va.com
ecodfairs.top
easyhealthconsulting.com
URLs
https://onedrive.live.com/download?cid=E0CF7F9E6AAF27EF&resid=E0CF7F9E6AAF27EF%211127&authkey=AACpuMTQgoYJSTc
https://onedrive.live.com/download?resid=9ADCDEDB531E38FE%21107&authkey=!AIYYWqDY10e5-pU
https://drive.google.com/uc?export=download&id=1SisUFlJTSsT_W48Ix2VwvCg8Ow1r24hB
https://elmauz.box.com/shared/static/gqtnnv55lt0beo9fdcpu8fhnomsn4frv
https://elmauz.box.com/shared/static/l7md6mo4ghc25hj55ks0qsecl54f3owd
https://envoy.ae/wp-content/255_Ujwtoykllem
https://eventureofficial.com/avi/255_Aerocihhjph
https://onedrive.live.com/download?resid=B24528E77689F9AC%21162&authkey=!APfH4vXvDJEK1Qc
https://graffae-my.sharepoint.com/:u:/g/personal/estimator_graff_ae/ESzPznTn8AFIvXMxVlfeGnQB1JU84pa9QWYq__I7ido6tw
https://onedrive.live.com/download?cid=824D488A9DAFF0AD&resid=824D488A9DAFF0AD%21251&authkey=ACPF8316xVfUYX8
https://onedrive.live.com/download?resid=FDB0512DE793B32E%21192&authkey=!AAbMANNKbvJdxgc
https://texanpishgam.com/255_Vfxszmgsico
https://onedrive.live.com/download?resid=BAF30C9243AC3050%21114&authkey=!ACfGQrCE2jZmaGY
https://onedrive.live.com/download?resid=D3673E68E5EC9158%211149&authkey=!AHoNLnhDQ7JXRfE
https://onedrive.live.com/download?resid=BAF30C9243AC3050%21113&authkey=!AL1F5Ls5tRUL_Zc
https://onedrive.live.com/download?resid=B1ECA84DA338710%21141&authkey=!AM8iPPr5XjNuSfI
https://onedrive.live.com/download?resid=EC65F7540219AA70%211133&authkey=!AMWndWnBx3SFu3w
https://onedrive.live.com/download?resid=F4D24344D7B13420%21110&authkey=!AL5-vxbOzO8Bd8E
https://2007.filemail.com/api/file/get
https://2014.filemail.com/api/file/get
Last Seen at
Last Seen at

Recent blog posts

post image
New Redline Version: Uses Lua Bytecode, Propa...
watchers 106
comments 0
post image
Find Malware by File Contents with YARA Searc...
watchers 1027
comments 0
post image
Cybercriminals Exploit Google Ads to Spread I...
watchers 468
comments 0

What is DBatLoader malware?

DBatLoader is a loader written in Delphi that has been in extensive use among attackers since 2020. One of the key features of the malware is its reliance on legitimate cloud-based platforms such as Discord for hosting its payloads. DBatLoader has been involved in numerous campaigns and leveraged to deploy stealers, trojans, and other threats.

In most cases, DBatLoader manages to infect machines via multi-stage attacks. For instance, victims may receive an email attachment in the form of a PDF file. Upon opening the attachment, users may be prompted to click on a seemingly genuine button embedded with a malicious link. Clicking this link will initiate the download of a Windows Cabinet file, which, in turn, will trigger the installation of DBatLoader on the unsuspecting user's computer.

Get started today for free

Easily analyze emerging malware with ANY.RUN interactive online sandbox

Register for free

Technical details of the DBatLoader malicious software

DBatLoader’s sole purpose is to distribute other malware on the devices it manages to infect. To do this, the developers behind DBatLoader have equipped their malicious software with several advanced capabilities.

For example, DBatLoader can avoid User Account Control (UAC) to gain elevated privileges. It does this by exploiting the mock folder vulnerability. In Windows, executables launched from certain system directories can auto-elevate. DBatLoader exploits this by creating a mock folder with the same name as a trusted location, such as "C:\Windows\System32 ".

On top of that, DBatLoader copies a legitimate process to this fake folder and then injects it with its malicious DLL that allows the payload downloaded by DBatLoader to execute freely without any security notifications, achieving sustained persistence.

Another common vulnerability abused by DBatLoader in previous attacks was CVE-2018-0798, an exploit targeting Equation Editor in Microsoft Office. The malware has also been observed to utilize steganography.

As mentioned, DBatLoader is usually configured to pull malicious payloads from servers of popular cloud storage services, including Microsoft OneDrive and Google Drive. Some of the notable examples of malware dropped by DBatLoader are Formbook, Warzone, and Remcos.

Execution process of DBatLoader

In order to detect DBatLoader, it is vital to analyze the latest samples of this malware and collect up-to-date information on it. To this end, we can use ANY.RUN, a malware analysis sandbox that lets us quickly analyze any suspicious file or link to spot threats.

Let’s upload a sample of DBatLoader to ANY.RUN and study its behavior.

In this task, DBatLoader was distributed as an executable file with a name mimicking the title of a document, attempting to trick users into opening the file and executing the malicious code. Upon execution, DBatLoader downloads and injects the Formbook malware into the Control and Explorer system processes, enabling its malicious activity.

Analyze malware for free in a fully interactive cloud sandbox – sign up now!

DBatLoader process tree shown in ANY.RUN DBatLoader's process tree demonstrated in ANY.RUN

In addition, this loader can be used in more sophisticated attacks, such as exploiting vulnerabilities to penetrate the system. These can be familiar vulnerabilities like CVE-2017-11882, as well as lesser known ones. On top of that, DBatLoader can also make use of system utilities in its attacks. In this task, a whole arsenal of system utilities is actively used, such as cmd, ping, and xcopy, including for the purpose of lateral movement. Eventually, DBatLoader drops Remcos that instantly begins its operation.

Distribution methods of the DBatLoader malware

Phishing campaigns constitute the most common vector of attack involving DBatLoader. Emails sent by the operators of the malware target different organizations and are masqueraded as genuine messages. In many cases, criminals even use legitimate email addresses they manage to hijack or gain access to.

The subject of such emails concerns different business-related matters, such as payments and other arrangements. For example, attackers may send fake invoices as Microsoft Office or PDF files. These files usually contain a link that, once clicked, can trigger the infection leading to DBatLoader being dropped on the computer and the eventual deployment of the final payload.

Conclusion

DBatLoader remains an active threat commonly used by criminals in their attacks on various types of organizations. To keep your infrastructure safe, it is essential that you have strong security measures in place, especially when it comes to software for detecting and inspecting threats.

Use the ANY.RUN sandbox as a reliable tool for analyzing emails you receive to safely determine if they pose any danger. ANY.RUN’s interactive cloud environment makes it easy to investigate the most advanced phishing campaigns and uncover multi-stage attacks in minutes. The service provides you with convenient text reports containing all the relevant information on the files and links you submit, including fresh IOCs.

Try ANY.RUN for free – request a demo!

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy