MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3f1d6522a3dc9c69310b7c960788de537186c1256dae425eac2cf07c66dd3ab8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 3f1d6522a3dc9c69310b7c960788de537186c1256dae425eac2cf07c66dd3ab8
SHA3-384 hash: c7897901e028d2e68b640893b6e417207d7f5267385309e2f092189bf8d9cdd925b0ef7c005497c3cdf142a6edc871d1
SHA1 hash: f03d85ed189014095c782d9bbd1bcd3fd38ad0b5
MD5 hash: 36dd0aa64576417a98454aa4d478e423
humanhash: violet-spring-social-double
File name:3f1d6522a3dc9c69310b7c960788de537186c1256dae425eac2cf07c66dd3ab8
Download: download sample
File size:854'004 bytes
First seen:2021-02-28 07:22:27 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 12288:0Qnk3GDYKGcblwtX+t4Y8lTXsUJE+GPD1YtkW5PhmpZwP8cGlkCHcdpyU:IAOcZwXYeT8UJw+tDPQ67t
Threatray 402 similar samples on MalwareBazaar
TLSH 2E050202BBC184B2E5321D319A35AB14697D7D205F38DE2FB3D47E6DDB35080A625BA3
Reporter JAMESWT_WT

Intelligence


File Origin
# of uploads :
1
# of downloads :
323
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
DCRatBuild.exe
Verdict:
Malicious activity
Analysis date:
2021-02-24 14:01:29 UTC
Tags:
trojan rat backdoor dcrat evasion

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Creating a file
Creating a process from a recently created file
Running batch commands
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Creating a file in the Program Files subdirectories
Launching a process
DNS request
Sending an HTTP GET request
Unauthorized injection to a recently created process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
100 / 100
Signature
.NET source code contains in memory code execution
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Antivirus detection for dropped file
Drops PE files with benign system names
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Sigma detected: Executables Started in Suspicious Folder
Sigma detected: Execution in Non-Executable Folder
Uses schtasks.exe or at.exe to add and modify task schedules
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 359439 Sample: d6Qc73cO3c Startdate: 28/02/2021 Architecture: WINDOWS Score: 100 80 Antivirus detection for dropped file 2->80 82 Multi AV Scanner detection for dropped file 2->82 84 Multi AV Scanner detection for submitted file 2->84 86 7 other signatures 2->86 13 d6Qc73cO3c.exe 3 6 2->13         started        16 Registry.exe 3 2->16         started        19 vrgSYqKjskRwHxEtrE.exe 2->19         started        process3 dnsIp4 66 C:\monitorperf\gd5fnXMJGF4XYuWLxNDu.exe, PE32 13->66 dropped 22 wscript.exe 1 13->22         started        72 Antivirus detection for dropped file 16->72 74 Multi AV Scanner detection for dropped file 16->74 76 Machine Learning detection for dropped file 16->76 78 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 16->78 68 a0517959.xsph.ru 19->68 file5 signatures6 process7 process8 24 cmd.exe 1 22->24         started        process9 26 gd5fnXMJGF4XYuWLxNDu.exe 6 24->26         started        30 conhost.exe 24->30         started        file10 64 C:\monitorperf\driverdhcp.exe, PE32 26->64 dropped 96 Multi AV Scanner detection for dropped file 26->96 32 wscript.exe 1 26->32         started        signatures11 process12 process13 34 cmd.exe 1 32->34         started        process14 36 driverdhcp.exe 1 9 34->36         started        40 conhost.exe 34->40         started        file15 58 C:\Users\Default\...\vrgSYqKjskRwHxEtrE.exe, PE32 36->58 dropped 60 C:\PerfLogs\Registry.exe, PE32 36->60 dropped 62 C:\MSOCache\All Users\...\csrss.exe, PE32 36->62 dropped 88 Antivirus detection for dropped file 36->88 90 Multi AV Scanner detection for dropped file 36->90 92 Machine Learning detection for dropped file 36->92 94 3 other signatures 36->94 42 vrgSYqKjskRwHxEtrE.exe 14 3 36->42         started        46 schtasks.exe 1 36->46         started        48 schtasks.exe 1 36->48         started        50 schtasks.exe 1 36->50         started        signatures16 process17 dnsIp18 70 a0517959.xsph.ru 141.8.197.42, 49725, 49726, 49727 SPRINTHOSTRU Russian Federation 42->70 98 Antivirus detection for dropped file 42->98 100 Multi AV Scanner detection for dropped file 42->100 102 Machine Learning detection for dropped file 42->102 104 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 42->104 52 conhost.exe 46->52         started        54 conhost.exe 48->54         started        56 conhost.exe 50->56         started        signatures19 process20
Threat name:
Win32.Backdoor.LightStone
Status:
Malicious
First seen:
2021-02-27 00:11:28 UTC
AV detection:
19 of 29 (65.52%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Creates scheduled task(s)
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
7dcf5dd7d87f20d3eab3cc148312d0195ebeb640003f8eb32bc1d842a2ce072e
MD5 hash:
3ee62c97882fdb583525441404061991
SHA1 hash:
17f7361c3ba976e7c4926aff5f0ec8d1dfe71485
SH256 hash:
3f1d6522a3dc9c69310b7c960788de537186c1256dae425eac2cf07c66dd3ab8
MD5 hash:
36dd0aa64576417a98454aa4d478e423
SHA1 hash:
f03d85ed189014095c782d9bbd1bcd3fd38ad0b5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments