MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2f0ff1a3573cb45775b709b1e8df418ff7adcc5b678a52a768d02933b6174ca6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DCRat


Vendor detections: 22


Intelligence 22 IOCs 1 YARA 45 File information Comments

SHA256 hash: 2f0ff1a3573cb45775b709b1e8df418ff7adcc5b678a52a768d02933b6174ca6
SHA3-384 hash: abae591cc3c02a7bc98325518a91c3539e75fee9146bbb5de4f58e44c5f4dcbf16c3f0b0ba5cb071e78f3ff7de0dc8ec
SHA1 hash: 202b2aca2c2d9eee7dd73032432670a03d1e5c22
MD5 hash: 849955535b2314f0abb2e85248736084
humanhash: wyoming-march-stream-utah
File name:849955535b2314f0abb2e85248736084.exe
Download: download sample
Signature DCRat
File size:2'115'584 bytes
First seen:2025-08-23 04:55:10 UTC
Last seen:2025-08-23 09:25:10 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 24576:V2G/nvxW3WieCQdigWxHvnSe7kpmUpJDkDy+7XRjkpnCYMZ5hXXbl:VbA3jwiN1v6DkDyQOpnCtZ5tr
TLSH T1B6A5AF0179519A75F0551933D6BF0A2087F4B8A42AA0E727BAF93B3D1E023B37D1D6C6
TrID 63.7% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
17.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.3% (.EXE) InstallShield setup (43053/19/16)
2.5% (.EXE) Win64 Executable (generic) (10522/11/4)
1.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
Magika pebin
Reporter abuse_ch
Tags:DCRat exe RAT


Avatar
abuse_ch
DCRat C2:
http://cf39442.tw1.ru/e4c710f3.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://cf39442.tw1.ru/e4c710f3.php https://threatfox.abuse.ch/ioc/1572799/

Intelligence


File Origin
# of uploads :
2
# of downloads :
90
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
849955535b2314f0abb2e85248736084.exe
Verdict:
Malicious activity
Analysis date:
2025-08-23 04:58:40 UTC
Tags:
auto-sch dcrat rat netreactor xworm remote darkcrystal

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
autorun emotet cobalt
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending an HTTP GET request
Running batch commands
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Creating a file in the Program Files subdirectories
Setting browser functions hooks
Creating a file in the %temp% directory
Creating a process from a recently created file
Launching a process
Forced system process termination
Сreating synchronization primitives
Searching for synchronization primitives
Creating a window
DNS request
Connection attempt
Searching for the window
Sending a custom TCP request
Creating a file
Unauthorized injection to a recently created process
Blocking the User Account Control
Unauthorized injection to a system process
Unauthorized injection to a browser process
Enabling autorun by creating a file
Adding an exclusion to Microsoft Defender
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context anti-debug anti-vm anti-vm asyncrat base64 cmd crypto cscript dcrat exploit explorer fingerprint fingerprint lolbin msbuild obfuscated obfuscated overlay packed prometheus r77rootkit reconnaissance schtasks stealer unsafe windows xworm
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-08-09T15:25:00Z UTC
Last seen:
2025-08-09T15:25:00Z UTC
Hits:
~1000
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
DCRat, XWorm
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates processes via WMI
Disable UAC(promptonsecuredesktop)
Disables UAC (registry)
Drops PE files to the user root directory
Drops PE files with benign system names
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs new ROOT certificates
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample uses string decryption to hide its real strings
Sigma detected: Files With System Process Name In Unsuspected Locations
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected DCRat
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1763428 Sample: pWxJgQpoE8.exe Startdate: 23/08/2025 Architecture: WINDOWS Score: 100 85 rentry.co 2->85 87 i.ibb.co 2->87 111 Found malware configuration 2->111 113 Malicious sample detected (through community Yara rule) 2->113 115 Antivirus detection for dropped file 2->115 119 15 other signatures 2->119 10 pWxJgQpoE8.exe 20 5 2->10         started        15 pWxJgQpoE8.exe 6 6 2->15         started        signatures3 117 Connects to a pastebin service (likely for C&C) 85->117 process4 dnsIp5 91 i.ibb.co 207.174.26.219, 443, 49713, 49716 RCN-ASUS United States 10->91 93 rentry.co 172.67.75.40, 443, 49718 CLOUDFLARENETUS United States 10->93 75 C:\Users\user\AppData\...\ecsfcvrq.4ig.exe, PE32+ 10->75 dropped 77 C:\Users\user\AppData\...\bgntz2ed.kx4.exe, PE32 10->77 dropped 135 Uses schtasks.exe or at.exe to add and modify task schedules 10->135 137 Found direct / indirect Syscall (likely to bypass EDR) 10->137 17 bgntz2ed.kx4.exe 10->17         started        21 ecsfcvrq.4ig.exe 1 10->21         started        23 schtasks.exe 1 10->23         started        25 schtasks.exe 1 10->25         started        79 C:\Users\user\AppData\...\yvpkcag1.a1b.exe, PE32+ 15->79 dropped 81 C:\Users\user\AppData\...\4nhwihv3.xuj.exe, PE32 15->81 dropped 83 C:\Users\user\AppData\...\pWxJgQpoE8.exe.log, CSV 15->83 dropped 27 yvpkcag1.a1b.exe 15->27         started        29 4nhwihv3.xuj.exe 15->29         started        31 schtasks.exe 15->31         started        33 schtasks.exe 15->33         started        file6 signatures7 process8 file9 63 C:\...\runtimeMonitordll.exe, PE32 17->63 dropped 65 C:\...\6I2n9HJu1iOlNM.vbe, data 17->65 dropped 95 Multi AV Scanner detection for dropped file 17->95 35 wscript.exe 17->35         started        97 Antivirus detection for dropped file 21->97 99 Contains functionality to inject code into remote processes 21->99 101 Writes to foreign memory regions 21->101 109 3 other signatures 21->109 38 lsass.exe 6 21->38 injected 50 3 other processes 21->50 40 conhost.exe 23->40         started        42 conhost.exe 25->42         started        103 Injects code into the Windows Explorer (explorer.exe) 27->103 105 Allocates memory in foreign processes 27->105 107 Creates a thread in another existing process (thread injection) 27->107 52 14 other processes 27->52 44 wscript.exe 29->44         started        46 conhost.exe 31->46         started        48 conhost.exe 33->48         started        signatures10 process11 dnsIp12 121 Windows Scripting host queries suspicious COM object (likely to drop second stage) 35->121 55 cmd.exe 35->55         started        123 Installs new ROOT certificates 38->123 125 Writes to foreign memory regions 38->125 89 127.0.0.1 unknown unknown 52->89 signatures13 process14 process15 57 runtimeMonitordll.exe 55->57         started        61 conhost.exe 55->61         started        file16 67 C:\Windows\...\0NXLfgC0jq4oxYmHAlsqvW.exe, PE32 57->67 dropped 69 C:\Windows\...\CIPUGvjga7WoG.exe, PE32 57->69 dropped 71 C:\Windows\Migration\cmd.exe, PE32 57->71 dropped 73 15 other malicious files 57->73 dropped 127 Antivirus detection for dropped file 57->127 129 Multi AV Scanner detection for dropped file 57->129 131 Drops PE files to the user root directory 57->131 133 4 other signatures 57->133 signatures17
Verdict:
Malware
YARA:
14 match(es)
Tags:
.Net .Net Obfuscator .Net Reactor Executable Managed .NET Obfuscated PDB Path PE (Portable Executable) PE File Layout SOS: 0.82 SOS: 0.90 VBScript Encoded Win 32 Exe WScript.Shell x86
Threat name:
ByteCode-MSIL.Trojan.Heracles
Status:
Malicious
First seen:
2025-08-10 22:27:08 UTC
File Type:
PE (.Net Exe)
Extracted files:
21
AV detection:
24 of 24 (100.00%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
unc_loader_051 r77rootkit
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:dcrat family:xworm bootkit defense_evasion discovery execution infostealer persistence rat trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System policy modification
Uses Task Scheduler COM API
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
SmartAssembly .NET packer
Checks whether UAC is enabled
Enumerates connected drives
Writes to the Master Boot Record (MBR)
Checks BIOS information in registry
Checks computer location settings
Executes dropped EXE
Indicator Removal: Clear Windows Event Logs
Command and Scripting Interpreter: PowerShell
Modifies trusted root certificate store through registry
Sets service image path in registry
DCRat payload
DcRat
Dcrat family
Detect Xworm Payload
Process spawned unexpected child process
Suspicious use of NtCreateProcessExOtherParentProcess
Suspicious use of NtCreateUserProcessOtherParentProcess
UAC bypass
Xworm
Xworm family
Verdict:
Malicious
Tags:
rat dcrat rootkit trojan Win.Trojan.Uztuby-9855059-0
YARA:
MAL_EXE_DCRat_Jul_08_2 Windows_Rootkit_R77_Be403E3C Windows_Rootkit_R77_d0367e28 MALWARE_Win_R77
Unpacked files
SH256 hash:
2f0ff1a3573cb45775b709b1e8df418ff7adcc5b678a52a768d02933b6174ca6
MD5 hash:
849955535b2314f0abb2e85248736084
SHA1 hash:
202b2aca2c2d9eee7dd73032432670a03d1e5c22
SH256 hash:
39dc98aab824b50c4c5171f784ba828aeba17aef6f195bb0af91a69e169956f5
MD5 hash:
3853d56a7f3197ef5c893c4c40a83d13
SHA1 hash:
a1dc754f11855e8059312eb8247625b253a45678
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:BAZT_B5_NOCEXInvalidStream
Rule name:botnet_plaintext_c2
Author:cip
Description:Attempts to match at least some of the strings used in some botnet variants which use plaintext communication protocols.
Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:dcrat_
Author:Michelle Khalil
Description:This rule detects unpacked dcrat malware samples.
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__MemoryWorkingSet
Author:Fernando Mercês
Description:Anti-debug process memory working set size check
Reference:http://www.gironsec.com/blog/2015/06/anti-debugger-trick-quicky/
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:DotNet_Reactor
Author:@bartblaze
Description:Identifies .NET Reactor, which offers .NET code protection such as obfuscation, encryption and so on.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:Indicator_MiniDumpWriteDump
Author:Obscurity Labs LLC
Description:Detects PE files and PowerShell scripts that use MiniDumpWriteDump either through direct imports or string references
Rule name:MALWARE_Win_R77
Author:ditekSHen
Description:Detects r77 rootkit
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_imphash
Rule name:PureCrypter
Author:@bartblaze
Description:Identifies PureCrypter, .NET loader and obfuscator.
Reference:https://malpedia.caad.fkie.fraunhofer.de/details/win.purecrypter
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:Runtime_Broker_Variant_1
Author:Sn0wFr0$t
Description:Detecting malicious Runtime Broker
Rule name:SelfExtractingRAR
Author:Xavier Mertens
Description:Detects an SFX archive with automatic script execution
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Suspicious_PssCaptureSnapshot_Usage
Author:Dana Behling - Just me not for personal curiosity, no company.
Description:Detects binaries abusing PssCaptureSnapshot in combination with typical combination that indicates malicious activity.
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Windows_Rootkit_R77_be403e3c
Author:Elastic Security
Reference:https://www.elastic.co/security-labs/elastic-security-labs-steps-through-the-r77-rootkit
Rule name:Windows_Rootkit_R77_d0367e28
Author:Elastic Security
Reference:https://www.elastic.co/security-labs/elastic-security-labs-steps-through-the-r77-rootkit

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high
CHECK_TRUST_INFORequires Elevated Execution (level:requireAdministrator)high

Comments