MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 be81829ae93532f01dcb0953b6918e893d8c48dcca4ee311d5e915d826336add. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DCRat


Vendor detections: 17


Intelligence 17 IOCs 1 YARA 45 File information Comments

SHA256 hash: be81829ae93532f01dcb0953b6918e893d8c48dcca4ee311d5e915d826336add
SHA3-384 hash: 91cce5fed0a603e88c3285b74bae239d9646105f4da63740266e1caee50f531473abbb4d553b622748de32f69daa90f0
SHA1 hash: 0088f77a81ea6f7b062b74af458bc4e6214c5a81
MD5 hash: 13e7d751375c3c10e8e2198fb73aa705
humanhash: echo-paris-georgia-georgia
File name:DCRatBuild.exe
Download: download sample
Signature DCRat
File size:5'373'320 bytes
First seen:2025-06-10 14:55:21 UTC
Last seen:2025-06-11 05:32:13 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 12e12319f1029ec4f8fcbed7e82df162 (389 x DCRat, 52 x RedLineStealer, 51 x Formbook)
ssdeep 98304:yZdSmksIt3OdEhQRdTfcrOxoLiKVZNt4acnlaAzGs+dkua1JdmUKM:2dSmFImEhQrf+IrJR2falmUKM
Threatray 70 similar samples on MalwareBazaar
TLSH T12046330737C695B2C2632C328A68EE5184397C70AFE28EDF53C0265D5A769C1DA78377
TrID 81.6% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
8.3% (.EXE) UPX compressed Win32 Executable (27066/9/6)
3.2% (.EXE) Win64 Executable (generic) (10522/11/4)
2.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
Magika pebin
dhash icon 9494b494d4aeaeac (832 x DCRat, 172 x RedLineStealer, 134 x CryptOne)
Reporter abuse_ch
Tags:DCRat exe RAT


Avatar
abuse_ch
DCRat C2:
http://93.123.84.204/UniversalEternaltest/Sqlexternal7/5/low/1cdnhttp/cpu/requestprocessCpuPhp/TrackGamelongpolldle/0TemporaryLinux/1phpdatalifevideo/5/Api/7/privateDlelinePoll/SecureTouniversaltraffic/Localjslongpolldle/RequestUpdate/1/Tempapicentral/uploadspoll/ProcessAuthasyncwppublicTempCdndownloads.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://93.123.84.204/UniversalEternaltest/Sqlexternal7/5/low/1cdnhttp/cpu/requestprocessCpuPhp/TrackGamelongpolldle/0TemporaryLinux/1phpdatalifevideo/5/Api/7/privateDlelinePoll/SecureTouniversaltraffic/Localjslongpolldle/RequestUpdate/1/Tempapicentral/uploadspoll/ProcessAuthasyncwppublicTempCdndownloads.php https://threatfox.abuse.ch/ioc/1543387/

Intelligence


File Origin
# of uploads :
4
# of downloads :
479
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
NewTextDocument.exe
Verdict:
Malicious activity
Analysis date:
2025-06-10 13:41:18 UTC
Tags:
loader amadey github botnet stealer lumma hausbomber python discord telegram evasion auto coinminer miner gcleaner rdp generic asyncrat rat remote xworm pastebin clipper diamotrix arch-exec

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file
Creating a process from a recently created file
Sending a UDP request
Creating a file in the %AppData% directory
Launching a process
Using the Windows Management Instrumentation requests
Running batch commands
Creating a process with a hidden window
Loading a suspicious library
Enabling the 'hidden' option for recently created files
Creating a file in the Windows subdirectories
Creating a file in the %temp% directory
Launching a service
Loading a system driver
Unauthorized injection to a recently created process
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm anti-vm anti-vm backnet base64 cmd cscript explorer fingerprint hacktool installer lolbin lolbin microsoft_visual_cc mshta net netsh overlay overlay packed packed packed packer_detected quasarrat rat reconnaissance remote runonce schtasks sfx update
Result
Threat name:
DCRat, Quasar, Salat Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for dropped file
Connects to a pastebin service (likely for C&C)
Creates multiple autostart registry keys
Drops executable to a common third party application directory
Drops PE files with benign system names
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: System File Execution Location Anomaly
Suricata IDS alerts for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Yara detected DCRat
Yara detected Quasar RAT
Yara detected Salat Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1711088 Sample: DCRatBuild.exe Startdate: 10/06/2025 Architecture: WINDOWS Score: 100 106 pastebin.com 2->106 108 ipwho.is 2->108 110 bg.microsoft.map.fastly.net 2->110 126 Suricata IDS alerts for network traffic 2->126 128 Found malware configuration 2->128 130 Malicious sample detected (through community Yara rule) 2->130 134 12 other signatures 2->134 11 DCRatBuild.exe 3 8 2->11         started        15 csrss.exe 2->15         started        18 svhost.exe 2->18         started        20 3 other processes 2->20 signatures3 132 Connects to a pastebin service (likely for C&C) 106->132 process4 dnsIp5 84 C:\driverSession\Pulsar.exe, PE32 11->84 dropped 86 C:\driverSession\BridgeMsFontRef.exe, MS-DOS 11->86 dropped 88 C:\driverSession\2.exe, PE32 11->88 dropped 90 C:\driverSession\77Ui3yGOWqijjMFh5.vbe, data 11->90 dropped 158 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 11->158 22 wscript.exe 1 11->22         started        25 Pulsar.exe 4 11->25         started        28 2.exe 2 4 11->28         started        116 104.21.84.111, 443, 60811 CLOUDFLARENETUS United States 15->116 160 Tries to harvest and steal browser information (history, passwords, etc) 15->160 162 Tries to steal Crypto Currency Wallets 15->162 file6 signatures7 process8 dnsIp9 136 Windows Scripting host queries suspicious COM object (likely to drop second stage) 22->136 31 cmd.exe 22->31         started        70 C:\Users\user\AppData\Roaming\svhost.exe, PE32 25->70 dropped 138 Antivirus detection for dropped file 25->138 140 Multi AV Scanner detection for dropped file 25->140 142 Uses schtasks.exe or at.exe to add and modify task schedules 25->142 144 Hides that the sample has been downloaded from the Internet (zone.identifier) 25->144 33 svhost.exe 14 4 25->33         started        37 schtasks.exe 1 25->37         started        114 172.67.191.102, 443, 53032 CLOUDFLARENETUS United States 28->114 72 C:\Program Files (x86)\...\ciQrwOTJeyH2.exe, PE32 28->72 dropped 74 C:\Program Files (x86)behaviorgraphoogle\csrss.exe, PE32 28->74 dropped 146 Found many strings related to Crypto-Wallets (likely being stolen) 28->146 148 Creates multiple autostart registry keys 28->148 150 Drops PE files with benign system names 28->150 39 ciQrwOTJeyH2.exe 28->39         started        file10 signatures11 process12 dnsIp13 41 BridgeMsFontRef.exe 31->41         started        45 conhost.exe 31->45         started        100 87.121.105.130, 4782, 49687, 49695 NET1-ASBG Bulgaria 33->100 102 ipwho.is 15.204.213.5, 443, 49689 HP-INTERNET-ASUS United States 33->102 104 pastebin.com 104.22.69.199, 443, 49686 CLOUDFLARENETUS United States 33->104 118 Antivirus detection for dropped file 33->118 120 Multi AV Scanner detection for dropped file 33->120 122 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 33->122 124 5 other signatures 33->124 47 schtasks.exe 33->47         started        49 netsh.exe 33->49         started        51 conhost.exe 37->51         started        signatures14 process15 file16 76 C:\Windows\Migration\WTR\bnfDK1M4jH.exe, MS-DOS 41->76 dropped 78 C:\Users\user\Desktop\zoClyGXx.log, PE32 41->78 dropped 80 C:\Users\user\Desktop\srOmVrdI.log, PE32 41->80 dropped 82 7 other malicious files 41->82 dropped 152 Antivirus detection for dropped file 41->152 154 Multi AV Scanner detection for dropped file 41->154 156 Drops executable to a common third party application directory 41->156 53 cmd.exe 41->53         started        55 conhost.exe 47->55         started        57 conhost.exe 49->57         started        signatures17 process18 process19 59 xUaGEuGnz.exe 53->59         started        64 conhost.exe 53->64         started        66 chcp.com 53->66         started        68 w32tm.exe 53->68         started        dnsIp20 112 93.123.84.204, 49699, 49700, 49701 NET1-ASBG Bulgaria 59->112 92 C:\Users\user\Desktop\ktGwNMpC.log, PE32 59->92 dropped 94 C:\Users\user\Desktop\fFpxlPaO.log, PE32 59->94 dropped 96 C:\Users\user\Desktop\MoCRRKPy.log, PE32 59->96 dropped 98 C:\Users\user\Desktop\KmPjvbLD.log, PE32 59->98 dropped 164 Antivirus detection for dropped file 59->164 166 Multi AV Scanner detection for dropped file 59->166 168 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 59->168 170 2 other signatures 59->170 file21 signatures22
Threat name:
ByteCode-MSIL.Trojan.Amadey
Status:
Malicious
First seen:
2025-06-10 14:55:31 UTC
File Type:
PE (Exe)
Extracted files:
18
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Result
Malware family:
salatstealer
Score:
  10/10
Tags:
family:dcrat family:quasar family:salatstealer botnet:sv credential_access discovery infostealer persistence privilege_escalation rat spyware stealer trojan upx
Behaviour
Modifies registry class
Modifies system certificate store
Runs ping.exe
Scheduled Task/Job: Scheduled Task
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Browser Information Discovery
Enumerates physical storage devices
Event Triggered Execution: Netsh Helper DLL
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
System Network Configuration Discovery: Wi-Fi Discovery
Drops file in Program Files directory
Drops file in Windows directory
UPX packed file
Accesses cryptocurrency files/wallets, possible credential harvesting
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Executes dropped EXE
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Unsecured Credentials: Credentials In Files
DCRat payload
DcRat
Dcrat family
Detect SalatStealer payload
Quasar RAT
Quasar family
Quasar payload
Salatstealer family
salatstealer
Malware Config
C2 Extraction:
https://pastebin.com/raw/n3KdM6ML
Verdict:
Malicious
Tags:
Win.Trojan.Uztuby-9855059-0
YARA:
n/a
Unpacked files
SH256 hash:
be81829ae93532f01dcb0953b6918e893d8c48dcca4ee311d5e915d826336add
MD5 hash:
13e7d751375c3c10e8e2198fb73aa705
SHA1 hash:
0088f77a81ea6f7b062b74af458bc4e6214c5a81
SH256 hash:
92790240219a2d69182f68eb7626aeb48dc6cdbc8d9cd9c27c7890c74c674c0c
MD5 hash:
059643f7ab511e898179384b83e58a7a
SHA1 hash:
a6ea6d30f265e9abb01803e1f48035b95db2edb6
Detections:
SUSP_Imphash_Mar23_3
SH256 hash:
4513dcaac6bdbdcd00b26cb655ab8f4cd977f016ec1c0c99f6b9105b4b24578e
MD5 hash:
d47f9dc3208ab6e7e8fdc894a807c841
SHA1 hash:
149aec6fb6259650f7ec2bf38eb9c8ff9203bd6e
Detections:
INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs
SH256 hash:
9aae92430078871b73bdbd05bce2897c507bb0beb8e961ab78e2cb95e008c09b
MD5 hash:
a975067f38f53b9652a6f383b8bdcbe2
SHA1 hash:
6d7e105e24653f0b19fdd8518adf38418dd4b971
SH256 hash:
a270cf8fa0817a65daf2814b8b007a467480c76f9e06ff5e4196ecc7903f1ee3
MD5 hash:
48f7f317fa899ec4b747ca85f3f2543a
SHA1 hash:
3976751c46f182dbedde214fd49814e1c41a47e5
Detections:
QuasarRAT cn_utf8_windows_terminal malware_windows_xrat_quasarrat MAL_QuasarRAT_May19_1 MAL_BackNet_Nov18_1 INDICATOR_EXE_Packed_Fody INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
SH256 hash:
b4bbabdea239ef79c09b0fb6b30f7850fb0efcf0c8fdb509362beadb4757b61a
MD5 hash:
abf3f6c97acafbaf21230a8df7bda92a
SHA1 hash:
6b3a503e05eca21c452f7e456aa92759b4e9d34d
Detections:
SUSP_NET_Large_Static_Array_In_Small_File_Jan24 HKTL_NET_GUID_Quasar
SH256 hash:
2b93377ea087225820a9f8e4f331005a0c600d557242366f06e0c1eae003d669
MD5 hash:
d8bf2a0481c0a17a634d066a711c12e9
SHA1 hash:
7cc01a58831ed109f85b64fe4920278cedf3e38d
SH256 hash:
80e1a5e95a2412691095f76c4e812cf623c3c63ae5a79545c99745f27e023050
MD5 hash:
91fb2078c1dd5d8307149d9ea288fff9
SHA1 hash:
91f1473740ca436583ea9817c42727c8eacabb8d
SH256 hash:
3c46e9fabfd6458e1b0d31ca7693c355a4b2cb066c9b790fb12bb8438718c374
MD5 hash:
9cc9d930afd9454b3ce3c91a948722c0
SHA1 hash:
222a7d8b967f2128acce9fee80582b74398c7cd2
Detections:
cn_utf8_windows_terminal INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:botnet_plaintext_c2
Author:cip
Description:Attempts to match at least some of the strings used in some botnet variants which use plaintext communication protocols.
Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:dcrat_
Author:Michelle Khalil
Description:This rule detects unpacked dcrat malware samples.
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__ConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectGoMethodSignatures
Author:Wyatt Tauber
Description:Detects Go method signatures in unpacked Go binaries
Rule name:Detect_Go_GOMAXPROCS
Author:Obscurity Labs LLC
Description:Detects Go binaries by the presence of runtime.GOMAXPROCS in the runtime metadata
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:GoBinTest
Rule name:golang
Rule name:Golangmalware
Author:Dhanunjaya
Description:Malware in Golang
Rule name:golang_binary_string
Description:Golang strings present
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:grakate_stealer_nov_2021
Rule name:Heuristics_ChromeABE
Author:Still
Description:attempts to match instructions related to Chrome App-bound Encryption elevation service; possibly spotted amongst infostealers
Rule name:HiveRansomware
Author:Dhanunjaya
Description:Yara Rule To Detect Hive V4 Ransomware
Rule name:identity_golang
Author:Eric Yocam
Description:find Golang malware
Rule name:INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs
Author:ditekSHen
Description:Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:Macos_Infostealer_Wallets_8e469ea0
Author:Elastic Security
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:mpress_2_xx_net
Author:Kevin Falcoz
Description:MPRESS v2.XX .NET
Rule name:Multi_Generic_Threat_19854dc2
Author:Elastic Security
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:ProgramLanguage_Golang
Author:albertzsigovits
Description:Application written in Golang programming language
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:Rooter
Author:Seth Hardy
Description:Rooter
Rule name:RooterStrings
Author:Seth Hardy
Description:Rooter Identifying Strings
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SelfExtractingRAR
Author:Xavier Mertens
Description:Detects an SFX archive with automatic script execution
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:TeslaCryptPackedMalware
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:upx_largefile
Author:k3nr9
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DCRat

Executable exe be81829ae93532f01dcb0953b6918e893d8c48dcca4ee311d5e915d826336add

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
GDI_PLUS_APIInterfaces with Graphicsgdiplus.dll::GdiplusStartup
gdiplus.dll::GdiplusShutdown
gdiplus.dll::GdipAlloc
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryExA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetSystemInfo
KERNEL32.dll::GetStartupInfoW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::AllocConsole
KERNEL32.dll::AttachConsole
KERNEL32.dll::WriteConsoleW
KERNEL32.dll::FreeConsole
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateHardLinkW
KERNEL32.dll::CreateFileW
KERNEL32.dll::CreateFileMappingW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::MoveFileW
KERNEL32.dll::MoveFileExW

Comments