MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a468384b275c437d13c05d8433a2223910db37b9251fe0602752a7dc7664253c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
DCRat
Vendor detections: 15
| SHA256 hash: | a468384b275c437d13c05d8433a2223910db37b9251fe0602752a7dc7664253c |
|---|---|
| SHA3-384 hash: | 2298c09ec6971d65bad2dc621e7cb6490c6dc9e511417a1c8e877f0af7dd03edd3ff973b44e668d0d079e10406395417 |
| SHA1 hash: | dca3c3572947d17576f1530c9dc342bf0d9a70d8 |
| MD5 hash: | 0d8ef6d15966eb940b00e078b0ae0bb1 |
| humanhash: | wyoming-magnesium-zulu-angel |
| File name: | 0d8ef6d15966eb940b00e078b0ae0bb1.exe |
| Download: | download sample |
| Signature | DCRat |
| File size: | 1'628'672 bytes |
| First seen: | 2023-04-27 08:15:23 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | d5d9d937853db8b666bd4b525813d7bd (40 x DCRat, 28 x njrat, 5 x RedLineStealer) |
| ssdeep | 24576:Yv3+VeXk/DmHMhtQ6pmnQ4+LGddwLRjd4wbvla4ESuu2k9hs:K+JysLQ6pmaayjddb9VrQkzs |
| TLSH | T11275339FB89269CED1AD5239027AA2AF6A7AF70021560CDF5347282DC50FDECC54391F |
| TrID | 83.6% (.EXE) Win32 Executable MS Visual C++ 4.x (134693/65) 4.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 3.1% (.EXE) Win16 NE executable (generic) (5038/12/1) 2.7% (.EXE) Win32 Executable (generic) (4505/5/1) 1.2% (.EXE) Win16/32 Executable Delphi generic (2072/23) |
| File icon (PE): | |
| dhash icon | 400c6b6b9b9a0092 (1 x DCRat) |
| Reporter | |
| Tags: | DCRat exe |
abuse_ch
DCRat C2:http://188.120.226.231/wpLongpoll5Base/jsProcess/Geotest6multi/serverWp5Dle/36Pythonimage/7generatorprocessor6/wordpressMulti/central6/Datalife0/4dbjspoll/VideoHttpTestCentral.php
Intelligence
File Origin
# of uploads :
1
# of downloads :
269
Origin country :
NLVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
0d8ef6d15966eb940b00e078b0ae0bb1.exe
Verdict:
No threats detected
Analysis date:
2023-04-27 08:15:52 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
PlugX
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
packed poison shell32.dll
Verdict:
Malicious
Labled as:
Trojan.Generic
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Neshta
Verdict:
Malicious
Result
Threat name:
DCRat, Neshta
Detection:
malicious
Classification:
spre.troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to hide user accounts
Creates an autostart registry key pointing to binary in C:\Windows
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Creates processes via WMI
Drops executable to a common third party application directory
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with a suspicious file extension
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Hides threads from debuggers
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected DCRat
Yara detected Neshta
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.VBinder
Status:
Malicious
First seen:
2023-04-22 20:17:55 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
22 of 22 (100.00%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Result
Malware family:
neshta
Score:
10/10
Tags:
family:dcrat family:neshta evasion infostealer persistence rat spyware stealer
Behaviour
Creates scheduled task(s)
Kills process with taskkill
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Modifies system executable filetype association
Reads user/profile data of web browsers
Stops running service(s)
DCRat payload
DcRat
Modifies WinLogon for persistence
Neshta
Process spawned unexpected child process
Unpacked files
SH256 hash:
18fe48031a18449fab109af60ba11c09558d0a388962c14c1be453aff9126c0f
MD5 hash:
ad122d61ca248b162cc410a0d8220ee5
SHA1 hash:
c0c0f96efde22b527c90d8b3552f0a5584e317bb
SH256 hash:
e16d31256434834519f0fc54095f9a5e03700adaba2e51a75dad1ab581441323
MD5 hash:
1edd3839f47ae345890b4dc71ba6cfe5
SHA1 hash:
0b6593476cd3f7a7292c1e5f63e137aebb147708
SH256 hash:
ffe2511382eaef347d20e5482eb50babe18672aadeb479e2e960b4b1efcda5fa
MD5 hash:
237983cab05d288a6ce10c5a52817897
SHA1 hash:
23a88c708a18f0e513231357668075b112d366d0
Detections:
win_neshta_auto
SH256 hash:
3b2d67c12fb9248a282b48b115ba3c3f339ee9d4e37c381793db4b1b64d88fd3
MD5 hash:
1dde40817b31fedcd414a7857387d8da
SHA1 hash:
b67f778e885d5957d4be981ff581104d77f6ab43
SH256 hash:
fe9b06f8efd352674036543cb615db7a6e40a8c7802cfb4b5e064bf66800b275
MD5 hash:
793193bc4b137b27cab60d55e0a806ab
SHA1 hash:
161b921f9a91ee162f87cca4b7dbd85a876fa27c
Detections:
win_xorist_auto
SH256 hash:
a468384b275c437d13c05d8433a2223910db37b9251fe0602752a7dc7664253c
MD5 hash:
0d8ef6d15966eb940b00e078b0ae0bb1
SHA1 hash:
dca3c3572947d17576f1530c9dc342bf0d9a70d8
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Poison
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.