MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 58a7160bc9c6b737602ae6560a308cc5a824807f6ba4fb61efc5d5bb0c41ff91. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DCRat


Vendor detections: 10


Intelligence 10 IOCs 1 YARA 2 File information Comments

SHA256 hash: 58a7160bc9c6b737602ae6560a308cc5a824807f6ba4fb61efc5d5bb0c41ff91
SHA3-384 hash: c0b7b5711d4288cfc8c9391d56ec3a3f7aa57e10e519bd53dd1646f441bd53c5a70b7767cc254e697c1a7ed264ba5c7e
SHA1 hash: 422f13281c448338a885685a99a2fb71501d56e3
MD5 hash: 71b8ccb880b94fd599b9fca6ce1cbdd5
humanhash: july-michigan-chicken-island
File name:58A7160BC9C6B737602AE6560A308CC5A824807F6BA4F.exe
Download: download sample
Signature DCRat
File size:1'120'256 bytes
First seen:2022-03-21 00:20:57 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 24576:Qrnc3Ibr0gbmgoHCfwHl7gjUHgklkN+4:v2r0gbDq4CWU
Threatray 1'821 similar samples on MalwareBazaar
TLSH T10C3517127A46DD02E0293A3BC9DF452457A8BD417B6ADB1B7E9F336D70123A70D0E1CA
Reporter abuse_ch
Tags:DCRat exe


Avatar
abuse_ch
DCRat C2:
http://a0566780.xsph.ru/JavascriptJscpu.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://a0566780.xsph.ru/JavascriptJscpu.php https://threatfox.abuse.ch/ioc/428723/

Intelligence


File Origin
# of uploads :
1
# of downloads :
259
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file
Using the Windows Management Instrumentation requests
Launching a process
Creating a file in the Program Files subdirectories
Creating a file in the system32 subdirectories
Creating a file in the Windows subdirectories
Creating a file in the %temp% directory
Running batch commands
Creating a process with a hidden window
Sending a custom TCP request
Sending a UDP request
Creating a process from a recently created file
DNS request
Connecting to a non-recommended domain
Sending an HTTP GET request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun by creating a file
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug anti-vm cmd.exe control.exe explorer.exe greyware hacktool obfuscated replace.exe schtasks.exe stealer
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Creates an autostart registry key pointing to binary in C:\Windows
Creates multiple autostart registry keys
Creates processes via WMI
Drops executables to the windows directory (C:\Windows) and starts them
Found malware configuration
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Program Location with Network Connections
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected DCRat
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 592841 Sample: 58A7160BC9C6B737602AE6560A3... Startdate: 21/03/2022 Architecture: WINDOWS Score: 100 40 Found malware configuration 2->40 42 Malicious sample detected (through community Yara rule) 2->42 44 Antivirus detection for dropped file 2->44 46 9 other signatures 2->46 7 58A7160BC9C6B737602AE6560A308CC5A824807F6BA4F.exe 10 25 2->7         started        12 hVtVDkXAwhhrXjTUvB.exe 3 2->12         started        14 ctfmon.exe 3 2->14         started        16 16 other processes 2->16 process3 dnsIp4 36 192.168.2.1 unknown unknown 7->36 28 C:\Windows\System32\...\UsoClient.exe, PE32 7->28 dropped 30 C:\Users\Public\...\hVtVDkXAwhhrXjTUvB.exe, PE32 7->30 dropped 32 C:\Recovery\ctfmon.exe, PE32 7->32 dropped 34 10 other malicious files 7->34 dropped 48 Creates multiple autostart registry keys 7->48 50 Creates an autostart registry key pointing to binary in C:\Windows 7->50 52 Creates processes via WMI 7->52 18 cmd.exe 7->18         started        54 Antivirus detection for dropped file 12->54 56 Multi AV Scanner detection for dropped file 12->56 58 Machine Learning detection for dropped file 12->58 38 a0566780.xsph.ru 141.8.197.42, 49794, 49795, 49796 SPRINTHOSTRU Russian Federation 16->38 file5 signatures6 process7 process8 20 conhost.exe 18->20         started        22 chcp.com 18->22         started        24 w32tm.exe 18->24         started        26 58A7160BC9C6B737602AE6560A308CC5A824807F6BA4F.exe 18->26         started       
Threat name:
ByteCode-MSIL.Trojan.SpyNoon
Status:
Malicious
First seen:
2022-03-20 01:50:00 UTC
File Type:
PE (.Net Exe)
AV detection:
31 of 42 (73.81%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:dcrat infostealer persistence rat suricata
Behaviour
Creates scheduled task(s)
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Drops file in System32 directory
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
DCRat Payload
DcRat
Process spawned unexpected child process
suricata: ET MALWARE DCRAT Activity (GET)
Unpacked files
SH256 hash:
8c8b3c698a0eed779ecf64d1fe25909c73cc3fb294c26a57bb0307fec833958a
MD5 hash:
bde770b403776e4fbcf78671150c5b26
SHA1 hash:
1c6cc6a382a0c7fb4c0d8210e90f062ee173ed8b
SH256 hash:
58a7160bc9c6b737602ae6560a308cc5a824807f6ba4fb61efc5d5bb0c41ff91
MD5 hash:
71b8ccb880b94fd599b9fca6ce1cbdd5
SHA1 hash:
422f13281c448338a885685a99a2fb71501d56e3
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments