MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 043933cf2d619c6da0e932c3e7a302f210f3ae09d924379f8ae257c9c291e292. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DCRat


Vendor detections: 9


Intelligence 9 IOCs 1 YARA 7 File information Comments

SHA256 hash: 043933cf2d619c6da0e932c3e7a302f210f3ae09d924379f8ae257c9c291e292
SHA3-384 hash: 212d1ecea9ef5a3db30532c42fcd636e756d50a9d55e1c43893563702421ef7af46867db56dbab4b419f579a3c2f0d11
SHA1 hash: 41e677513e9fdf99a7cd8cdb30a9485dd81bb422
MD5 hash: 26546808d37e8159ab8ad2cb5ab3e37d
humanhash: london-aspen-bakerloo-stream
File name:26546808D37E8159AB8AD2CB5AB3E37D.exe
Download: download sample
Signature DCRat
File size:1'895'424 bytes
First seen:2021-07-04 18:36:38 UTC
Last seen:2021-07-04 19:36:53 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'650 x AgentTesla, 19'462 x Formbook, 12'203 x SnakeKeylogger)
ssdeep 49152:uFnEIk9uBOOH0AJRqOxm14kQXdcnfCOe:uhEd9uB/H0C0v4k8c9e
TLSH 0495330A7A8DE7A8DA03A1786276EF841EF1D482754305A73EF5340E740D1D98E7EE4E
Reporter abuse_ch
Tags:DCRat exe


Avatar
abuse_ch
DCRat C2:
http://79.174.13.146/LinuxFlower.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://79.174.13.146/LinuxFlower.php https://threatfox.abuse.ch/ioc/157520/

Intelligence


File Origin
# of uploads :
2
# of downloads :
181
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
26546808D37E8159AB8AD2CB5AB3E37D.exe
Verdict:
Suspicious activity
Analysis date:
2021-07-04 18:41:16 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Binary is likely a compiled AutoIt script file
Connects to a pastebin service (likely for C&C)
Contains functionality to inject code into remote processes
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with benign system names
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Sigma detected: Schedule system process
Sigma detected: System File Execution Location Anomaly
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected DCRat
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 444033 Sample: uwoYazbVds.exe Startdate: 04/07/2021 Architecture: WINDOWS Score: 100 92 ipinfo.io 2->92 94 ip-api.com 2->94 102 Found malware configuration 2->102 104 Antivirus / Scanner detection for submitted sample 2->104 106 Multi AV Scanner detection for dropped file 2->106 110 11 other signatures 2->110 11 uwoYazbVds.exe 3 2->11         started        14 cmd.exe 2->14         started        17 lsass.exe 2->17         started        19 powershell.exe 2->19         started        signatures3 108 May check the online IP address of the machine 92->108 process4 file5 88 C:\Users\...\jQjMIQQTbAUmKGVfVPpaOIbW.exe, PE32 11->88 dropped 90 C:\Users\user\AppData\...\uwoYazbVds.exe.log, ASCII 11->90 dropped 21 jQjMIQQTbAUmKGVfVPpaOIbW.exe 8 11->21         started        130 Uses ping.exe to sleep 14->130 132 Drops executables to the windows directory (C:\Windows) and starts them 14->132 134 Uses ping.exe to check the status of other devices and networks 14->134 25 conhost.exe 14->25         started        28 conhost.exe 14->28         started        30 chcp.com 14->30         started        32 PING.EXE 14->32         started        136 Multi AV Scanner detection for dropped file 17->136 138 Machine Learning detection for dropped file 17->138 140 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 17->140 34 cmd.exe 17->34         started        signatures6 process7 dnsIp8 84 ReviewdriverintoDh...Reviewrefbroker.exe, PE32 21->84 dropped 86 C:\Users\user\AppData\RoamingbehaviorgraphHI.exe, PE32 21->86 dropped 120 Multi AV Scanner detection for dropped file 21->120 122 Machine Learning detection for dropped file 21->122 36 ReviewdriverintoDhcpsvcReviewrefbroker.exe 1 22 21->36         started        40 GHI.exe 6 21->40         started        42 conhost.exe 21->42         started        96 79.174.13.146, 49737, 49741, 80 THEFIRST-ASRU Russian Federation 25->96 124 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 25->124 file9 signatures10 process11 file12 72 C:\temp\taskhostw.exe, PE32 36->72 dropped 74 C:\Windows\System32\...\MusNotifyIcon.exe, PE32 36->74 dropped 76 C:\Windows\System32hStorShell\lsass.exe, PE32 36->76 dropped 82 4 other malicious files 36->82 dropped 112 Multi AV Scanner detection for dropped file 36->112 114 Machine Learning detection for dropped file 36->114 116 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 36->116 118 4 other signatures 36->118 44 MusNotifyIcon.exe 36->44         started        47 schtasks.exe 36->47         started        50 schtasks.exe 1 36->50         started        56 5 other processes 36->56 78 C:\tempbehaviorgraphH Injector - x64.exe, PE32+ 40->78 dropped 80 C:\tempbehaviorgraphH Injector - x64.dll, PE32+ 40->80 dropped 52 GH Injector - x64.exe 16 40->52         started        54 conhost.exe 40->54         started        signatures13 process14 dnsIp15 126 Multi AV Scanner detection for dropped file 44->126 128 Machine Learning detection for dropped file 44->128 98 4.0.0.0 LEVEL3US United States 47->98 58 conhost.exe 47->58         started        60 conhost.exe 50->60         started        62 WerFault.exe 50->62         started        100 pastebin.com 104.23.98.190, 443, 49730, 49731 CLOUDFLARENETUS United States 52->100 64 conhost.exe 56->64         started        66 conhost.exe 56->66         started        68 conhost.exe 56->68         started        signatures16 process17 process18 70 conhost.exe 58->70         started       
Threat name:
ByteCode-MSIL.Backdoor.LightStone
Status:
Malicious
First seen:
2021-07-01 09:03:28 UTC
AV detection:
24 of 46 (52.17%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:dcrat evasion infostealer rat spyware stealer trojan upx
Behaviour
Creates scheduled task(s)
Modifies registry class
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
Reads user/profile data of web browsers
Windows security modification
Executes dropped EXE
UPX packed file
DCRat Payload
Contains code to disable Windows Defender
DcRat
Modifies Windows Defender Real-time Protection settings
Unpacked files
SH256 hash:
6620c8dd97c92c84f718690a6a94887704ec151730b4ab9afaba56e4b04f041c
MD5 hash:
348354c2e8e5da972db0f1d4836e249e
SHA1 hash:
4d376dcb0ceb68a55e0d47f4165a4b013d0c1601
SH256 hash:
8f90d1fd0fa08ff932a0359c9c3300a2683b871dc30f8c099a2944a9983e6ace
MD5 hash:
073495fcdb3cce16679bf87f04231156
SHA1 hash:
366d3e5c4dcecb8fc4c54538a70733e592f3ce91
SH256 hash:
66050ba919a3a44343c1bb23554ddb71b929e460105aacaf045a7607e016de8d
MD5 hash:
6e05009a58b5c51f2ed1cdf06a482448
SHA1 hash:
8d61741c2eb8568991737995faba41a58ea4267f
SH256 hash:
043933cf2d619c6da0e932c3e7a302f210f3ae09d924379f8ae257c9c291e292
MD5 hash:
26546808d37e8159ab8ad2cb5ab3e37d
SHA1 hash:
41e677513e9fdf99a7cd8cdb30a9485dd81bb422
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE).
Rule name:Glasses
Author:Seth Hardy
Description:Glasses family
Rule name:GlassesCode
Author:Seth Hardy
Description:Glasses code features
Rule name:pe_imphash
Rule name:Select_from_enumeration
Author:James_inthe_box
Description:IP and port combo
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments