MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 56ec9503792bc40353a2f197bb3a6561325d66dfe914573a9fea9ccdedd98929. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
DCRat
Vendor detections: 7
| SHA256 hash: | 56ec9503792bc40353a2f197bb3a6561325d66dfe914573a9fea9ccdedd98929 |
|---|---|
| SHA3-384 hash: | b93cd978977bd4aa61d106d1e2edcfe306dd65d80725d37e166d6ab3b79418c61a7d31f113669de01bdeff5b138ba8aa |
| SHA1 hash: | 96ab3affa0279d5795a29f3e1ecae37546b8bb11 |
| MD5 hash: | 9886d20dd6f3d896861cc5f8ea0ca84b |
| humanhash: | river-batman-fish-pizza |
| File name: | Build.exe |
| Download: | download sample |
| Signature | DCRat |
| File size: | 1'866'591 bytes |
| First seen: | 2021-07-30 07:52:28 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat) |
| ssdeep | 49152:UbA30gth6l+eGtUvcx+GXJsVXu6jFKpveKB:Ubkth6l8x+GX4erpvzB |
| TLSH | T18A858C227E46DD12C5296A37C9EF847407B8BD003B26DB1A7E9F375D61213A31E0D9CA |
| dhash icon | 9494b494d4aeaeac (832 x DCRat, 172 x RedLineStealer, 134 x CryptOne) |
| Reporter | |
| Tags: | DCRat exe Levis228 |
Intelligence
File Origin
# of uploads :
1
# of downloads :
571
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Build.exe
Verdict:
Malicious activity
Analysis date:
2021-07-30 07:52:59 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Detection(s):
Win.Malware.Uztuby-9848412-0
Win.Packed.Uztuby-9851623-0
Win.Trojan.Uztuby-9855059-0
Win.Ransomware.Clinix-9868408-0
Win.Packed.Uztuby-9875336-0
Win.Malware.Qshell-9875653-0
Win.Packed.Uztuby-9877681-0
Win.Packed.Basic-9877684-0
Win.Malware.Uztuby-9878616-0
Win.Packed.Uztuby-9878629-0
Win.Malware.Uztuby-9878664-0
Win.Malware.Uztuby-9878756-0
SecuriteInfo.com.Trojan.Rasftuby.Gen.14.10239.27368.UNOFFICIAL
Win.Packed.Uztuby-9851623-0
Win.Trojan.Uztuby-9855059-0
Win.Ransomware.Clinix-9868408-0
Win.Packed.Uztuby-9875336-0
Win.Malware.Qshell-9875653-0
Win.Packed.Uztuby-9877681-0
Win.Packed.Basic-9877684-0
Win.Malware.Uztuby-9878616-0
Win.Packed.Uztuby-9878629-0
Win.Malware.Uztuby-9878664-0
Win.Malware.Uztuby-9878756-0
SecuriteInfo.com.Trojan.Rasftuby.Gen.14.10239.27368.UNOFFICIAL
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
Result
Threat name:
DCRat
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Creates an autostart registry key pointing to binary in C:\Windows
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Drops executables to the windows directory (C:\Windows) and starts them
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Sigma detected: Schedule system process
Sigma detected: WScript or CScript Dropper
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected DCRat
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.SpyNoon
Status:
Malicious
First seen:
2021-07-01 22:50:07 UTC
File Type:
PE (Exe)
Extracted files:
21
AV detection:
33 of 46 (71.74%)
Threat level:
5/5
Result
Malware family:
dcrat
Score:
10/10
Tags:
family:dcrat infostealer persistence rat
Behaviour
Creates scheduled task(s)
Modifies registry class
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
DCRat Payload
DcRat
Modifies WinLogon for persistence
Unpacked files
SH256 hash:
6cba34b2db52a921c97910d0e3122239c726c993b1d8c0e208f21502cfe20e21
MD5 hash:
413be497be904c09aa8bfe8f0182a949
SHA1 hash:
9c5a69c83dbe2629290823d33c0afbce6d37f7bf
SH256 hash:
7a4f85ad41f819370f5092ac0e3119b1686f2edec7351db9e04bbb7228e08f59
MD5 hash:
50a3a77f7a082d4e62674d19af2fff78
SHA1 hash:
c15bcff1e0105636f72930d3ac8b1351fcfa224d
SH256 hash:
56ec9503792bc40353a2f197bb3a6561325d66dfe914573a9fea9ccdedd98929
MD5 hash:
9886d20dd6f3d896861cc5f8ea0ca84b
SHA1 hash:
96ab3affa0279d5795a29f3e1ecae37546b8bb11
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.