MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1b208a1bb60c695961b673e6201ef66028f1d90f348dd07ba63322a920f94ac3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DCRat


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments

SHA256 hash: 1b208a1bb60c695961b673e6201ef66028f1d90f348dd07ba63322a920f94ac3
SHA3-384 hash: 556635441646285562b77fc816ffe6fe065f627e50af52df3a3ef6cac2fbf0fb0b40342ddc5f7c486c6ee4c456899ed7
SHA1 hash: f8fc36e512ca92c44c58180f334bea0f6f6e069a
MD5 hash: 0c466460989f864ab55d9e7d858b1ac9
humanhash: cardinal-vegan-butter-foxtrot
File name:0C466460989F864AB55D9E7D858B1AC9
Download: download sample
Signature DCRat
File size:1'156'117 bytes
First seen:2022-11-30 15:04:08 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 00be6e6c4f9e287672c8301b72bdabf3 (116 x RedLineStealer, 70 x AsyncRAT, 55 x AgentTesla)
ssdeep 24576:xW6VXRh//zyqtW4aBh+wwM7ZH5N7+esCNqQZmKaVXuDV4YC1+qfg:k6pyqDaBh+g7dfqeDsKaVXuDV4c
Threatray 3'990 similar samples on MalwareBazaar
TLSH T191351202FAD144B2E43219314929AF51F87CB6285F25DB6FE3C94D6CAD710E07236EA7
TrID 32.2% (.EXE) Win64 Executable (generic) (10523/12/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4505/5/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon cdabae6fe6e7eaec (20 x Amadey, 9 x AurotunStealer, 8 x CoinMiner)
Reporter VincentGribanov
Tags:DCRat exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
126
Origin country :
HK HK
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
0C466460989F864AB55D9E7D858B1AC9
Verdict:
Malicious activity
Analysis date:
2022-12-01 01:15:16 UTC
Tags:
trojan rat backdoor dcrat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Running batch commands
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Using the Windows Management Instrumentation requests
Launching a process
Creating a file in the Program Files subdirectories
Unauthorized injection to a recently created process
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay packed setupapi.dll shdocvw.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Creates processes via WMI
Drops PE files with benign system names
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected DCRat
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 756811 Sample: OUVuWxBc1K.exe Startdate: 30/11/2022 Architecture: WINDOWS Score: 100 52 Malicious sample detected (through community Yara rule) 2->52 54 Antivirus detection for dropped file 2->54 56 Multi AV Scanner detection for dropped file 2->56 58 5 other signatures 2->58 10 OUVuWxBc1K.exe 8 2->10         started        13 fontdrvhost.exe 2 2->13         started        16 fGwerIgXYEJuqFoJk.exe 2->16         started        18 28 other processes 2->18 process3 file4 42 C:\Users\user\AppData\...\Cheat_Check.exe, PE32 10->42 dropped 20 Cheat_Check.exe 3 7 10->20         started        64 Antivirus detection for dropped file 13->64 66 Multi AV Scanner detection for dropped file 13->66 68 Machine Learning detection for dropped file 13->68 signatures5 process6 file7 38 C:\...\chainsurrogatebroker.exe, PE32 20->38 dropped 40 C:\...\qDBY4JL7tbuOAaoyei99w6Eg.vbe, data 20->40 dropped 60 Antivirus detection for dropped file 20->60 62 Machine Learning detection for dropped file 20->62 24 wscript.exe 1 20->24         started        26 wscript.exe 20->26         started        signatures8 process9 process10 28 cmd.exe 1 24->28         started        process11 30 chainsurrogatebroker.exe 1 30 28->30         started        34 conhost.exe 28->34         started        file12 44 C:\Windows\en-US\fGwerIgXYEJuqFoJk.exe, PE32 30->44 dropped 46 C:\Windows\...\fGwerIgXYEJuqFoJk.exe, PE32 30->46 dropped 48 C:\ProgramData\...\fGwerIgXYEJuqFoJk.exe, PE32 30->48 dropped 50 10 other malicious files 30->50 dropped 70 Antivirus detection for dropped file 30->70 72 Multi AV Scanner detection for dropped file 30->72 74 Machine Learning detection for dropped file 30->74 76 2 other signatures 30->76 36 chainsurrogatebroker.exe 30->36         started        signatures13 process14
Threat name:
Win32.Trojan.Uztuby
Status:
Malicious
First seen:
2022-05-07 20:15:49 UTC
File Type:
PE (Exe)
Extracted files:
25
AV detection:
19 of 26 (73.08%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:dcrat infostealer rat
Behaviour
Creates scheduled task(s)
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
DcRat
Process spawned unexpected child process
Unpacked files
SH256 hash:
68bc850dddb5c5de6428d2dc706f62960a57e55fde12514eab45ad1d15b09ae9
MD5 hash:
019ebc1a8907424d370120b37e2ef855
SHA1 hash:
6459a6468669acc4486768c4b7fd37cab9700a3b
SH256 hash:
78a0b700b24557574706d4150d47c6eeb11e8479157c3efb3013c86e12691e2a
MD5 hash:
f09f3fb037d94a29feaf503e2805bf13
SHA1 hash:
33a726db8df7b14a8522ddfb8ae942b91a6be4d9
SH256 hash:
d23c28cb987a31f469982e1f375d12262baab359618655c62cb75d15e8840122
MD5 hash:
5556fe3310597af5f4f615f53161d935
SHA1 hash:
16f9aedb1797d11a1e56e1a63e53cacd04463ef8
SH256 hash:
eea7b7279080def3292e7af2b8144621f435ecb7255fbda844d3f6315d455575
MD5 hash:
885d9872640f8fd88e5125d6ff844487
SHA1 hash:
bd778e67f850f3d554dbb690bb6caf1036c50cac
SH256 hash:
3223f4fedba28f005995bfd93625f6759ca15b012df563a1dd9da6d3a5b7d389
MD5 hash:
ade1b5b9a3cdb38e290b895aafe48f3d
SHA1 hash:
278827b5bc87018d1736403a176450f7a0e78a6c
SH256 hash:
2d975c348223378ef77b844e87b109040be34b1838929b970b221556e1bae65f
MD5 hash:
17494c7ce4a9fc17f1a9d1419c6ec2fb
SHA1 hash:
50aca800ae92975dfbc6111df6a1311893ff2c2b
SH256 hash:
1b208a1bb60c695961b673e6201ef66028f1d90f348dd07ba63322a920f94ac3
MD5 hash:
0c466460989f864ab55d9e7d858b1ac9
SHA1 hash:
f8fc36e512ca92c44c58180f334bea0f6f6e069a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:sfx_pdb
Author:@razvialex
Description:Detect interesting files containing sfx with pdb paths.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments