MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 018c98c56b688182ad1e9a2e6e6de3c5ca656340771ead60edab2d9697d86bef. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
DCRat
Vendor detections: 11
| SHA256 hash: | 018c98c56b688182ad1e9a2e6e6de3c5ca656340771ead60edab2d9697d86bef |
|---|---|
| SHA3-384 hash: | 3b6caa06b68d0f8e5038d5499dae08a1ac263c6f95b2dc13d2410b1c34a7ffbf66de9249aed0f4a3cc4efb830e4cd163 |
| SHA1 hash: | 730fbb3b62e266a49e871532f529478f507a9cbb |
| MD5 hash: | 79503913c3e1d724e7f66314ba4623e0 |
| humanhash: | spaghetti-carpet-cola-early |
| File name: | file |
| Download: | download sample |
| Signature | DCRat |
| File size: | 3'192'832 bytes |
| First seen: | 2022-12-01 13:33:53 UTC |
| Last seen: | 2022-12-01 15:34:23 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 4cea7ae85c87ddc7295d39ff9cda31d1 (85 x RedLineStealer, 71 x LummaStealer, 62 x Rhadamanthys) |
| ssdeep | 49152:J03/11EAen+jm39LK9Aejeb9rbKv7dvNU54zvRewHAx9cW2dVrlN:u/11N2X3JsAeib9rbwdv6aeJ9cW6N |
| TLSH | T14CE545C063489967EE536AB84E4393DA871CFC90FA65324B3770F75E063A9D3AE15708 |
| TrID | 41.1% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 26.1% (.EXE) Win64 Executable (generic) (10523/12/4) 12.5% (.EXE) Win16 NE executable (generic) (5038/12/1) 5.1% (.ICL) Windows Icons Library (generic) (2059/9) 5.0% (.EXE) OS/2 Executable (generic) (2029/13) |
| File icon (PE): | |
| dhash icon | e8d4b27269f0f0e8 (1 x DCRat) |
| Reporter | |
| Tags: | DCRat exe |
andretavare5
Sample downloaded from https://vk.com/doc760750097_657226142?hash=723EHx1UjVZREOkv1NZJVAOcbCtGBlziBD3wGRJOCo4&dl=G43DANZVGAYDSNY:1669901136:pgSlCgS4JYxxqvjveU1f22S3rGnY0CzA2XoSRdS8L1g&api=1&no_preview=1#tIntelligence
File Origin
# of uploads :
31
# of downloads :
205
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
No threats detected
Analysis date:
2022-12-01 13:36:09 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
DCRat
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% subdirectories
DNS request
Creating a process from a recently created file
Creating a process with a hidden window
Sending a custom TCP request
Launching a process
Creating a window
Сreating synchronization primitives
Unauthorized injection to a recently created process
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
advpack.dll packed rundll32.exe setupapi.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Unknown
Result
Threat name:
DCRat
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Creates processes via WMI
Drops PE files with benign system names
Encrypted powershell cmdline option found
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Sigma detected: Schedule system process
Snort IDS alert for network traffic
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected DCRat
Yara detected Generic Downloader
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.Witch
Status:
Malicious
First seen:
2022-12-01 13:35:37 UTC
File Type:
PE+ (Exe)
Extracted files:
94
AV detection:
12 of 26 (46.15%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
asyncrat
Result
Malware family:
n/a
Score:
8/10
Tags:
persistence
Behaviour
Suspicious use of WriteProcessMemory
Adds Run key to start application
Executes dropped EXE
Verdict:
Malicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
018c98c56b688182ad1e9a2e6e6de3c5ca656340771ead60edab2d9697d86bef
MD5 hash:
79503913c3e1d724e7f66314ba4623e0
SHA1 hash:
730fbb3b62e266a49e871532f529478f507a9cbb
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
iSpy Keylogger
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Dropped by
PrivateLoader
Delivery method
Distributed via drive-by
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.