MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3fb7af8c998cbcc414afa0dccb923bbe75e68b619eaa3198d8ee216ef48f76b0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DCRat


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: 3fb7af8c998cbcc414afa0dccb923bbe75e68b619eaa3198d8ee216ef48f76b0
SHA3-384 hash: a69ff3b68e4767cb092c91b72bd139b667f55941ab529e1e576c6aaa3dc5c0d8eacb7554e89439e90f6303c8e3dd95f3
SHA1 hash: e57de05885743211ddddf370214b4bef2ebfdcad
MD5 hash: 037c2d1401aa72f8917b089844091a1b
humanhash: single-bulldog-two-shade
File name:037c2d1401aa72f8917b089844091a1b.exe
Download: download sample
Signature DCRat
File size:2'858'464 bytes
First seen:2023-12-28 07:52:08 UTC
Last seen:2023-12-28 09:14:59 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'469 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 49152:Ub19/FcTAfqchYMXKljgsZrUxUZUP6GXqPUmKKL/iBrhXebUjaFH9xbl:Ub19+ceMa5ZrUHJXqmKLavUIaFH99l
Threatray 22 similar samples on MalwareBazaar
TLSH T1F5D523184B5FC971DABD4BB8E195505672F14B0BC002F789BAA828F00D277D8CB9667F
TrID 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.7% (.EXE) Win64 Executable (generic) (10523/12/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.1% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:DCRat exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
319
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Creating a file
Creating a file in the %AppData% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a process with a hidden window
Loading a suspicious library
Sending a custom TCP request
Creating a file in the Program Files subdirectories
Creating a file in the Windows subdirectories
Creating a file in the %temp% directory
Running batch commands
Using the Windows Management Instrumentation requests
DNS request
Sending an HTTP POST request
Creating a window
Searching for synchronization primitives
Unauthorized injection to a recently created process
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
overlay packed stealer
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large strings
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected DCRat
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1367609 Sample: SL3qvfqA8t.exe Startdate: 28/12/2023 Architecture: WINDOWS Score: 100 60 812285cm.nyashtech.top 2->60 66 Snort IDS alert for network traffic 2->66 68 Multi AV Scanner detection for domain / URL 2->68 70 Antivirus detection for URL or domain 2->70 72 11 other signatures 2->72 10 SL3qvfqA8t.exe 2 2->10         started        signatures3 process4 signatures5 84 Writes to foreign memory regions 10->84 86 Allocates memory in foreign processes 10->86 88 Injects a PE file into a foreign processes 10->88 13 RegAsm.exe 3 10->13         started        16 conhost.exe 10->16         started        process6 file7 48 C:\Users\user\AppData\...\ms_updater.exe, PE32 13->48 dropped 50 C:\Users\user\AppData\Roaming\ms_update.exe, PE32+ 13->50 dropped 18 ms_updater.exe 4 36 13->18         started        22 ms_update.exe 1 13->22         started        process8 file9 40 C:\Users\user\Desktop\xsdTglMg.log, PE32 18->40 dropped 42 C:\Users\user\Desktop\pCZliFsw.log, PE32 18->42 dropped 44 C:\Users\user\Desktop\mMivbJsD.log, PE32 18->44 dropped 46 22 other malicious files 18->46 dropped 74 Antivirus detection for dropped file 18->74 76 Multi AV Scanner detection for dropped file 18->76 78 Machine Learning detection for dropped file 18->78 24 cmd.exe 1 18->24         started        27 conhost.exe 22->27         started        signatures10 process11 signatures12 80 Uses ping.exe to sleep 24->80 82 Uses ping.exe to check the status of other devices and networks 24->82 29 Idle.exe 14 477 24->29         started        34 conhost.exe 24->34         started        36 PING.EXE 1 24->36         started        38 chcp.com 1 24->38         started        process13 dnsIp14 62 812285cm.nyashtech.top 172.67.178.175, 49730, 49732, 49736 CLOUDFLARENETUS United States 29->62 64 104.21.31.169, 49859, 49883, 80 CLOUDFLARENETUS United States 29->64 52 C:\Users\user\Desktop\zjoBOVLz.log, PE32 29->52 dropped 54 C:\Users\user\Desktop\xqYScYaA.log, PE32 29->54 dropped 56 C:\Users\user\Desktop\tqLclpHK.log, PE32 29->56 dropped 58 16 other malicious files 29->58 dropped 90 Tries to harvest and steal browser information (history, passwords, etc) 29->90 file15 signatures16
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2023-12-27 23:47:58 UTC
File Type:
PE (.Net Exe)
Extracted files:
4
AV detection:
17 of 37 (45.95%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:zgrat rat
Behaviour
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Detect ZGRat V1
ZGRat
Unpacked files
SH256 hash:
aabcd69ba821340ea159964d9d2cf4f54307e55e605f446ae83122963f69b70d
MD5 hash:
d7196178d58b99fe0be9236e42049029
SHA1 hash:
2e56e50a7050b81249c44a73bf0238ac65d0cfc2
SH256 hash:
3fb7af8c998cbcc414afa0dccb923bbe75e68b619eaa3198d8ee216ef48f76b0
MD5 hash:
037c2d1401aa72f8917b089844091a1b
SHA1 hash:
e57de05885743211ddddf370214b4bef2ebfdcad
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments