MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6700075bf252fbc09453df6f543d36bbd7f7a011ed2b5bf7fc86df1c4b634c8d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DarkVisionRAT


Vendor detections: 12


Intelligence 12 IOCs YARA 10 File information Comments

SHA256 hash: 6700075bf252fbc09453df6f543d36bbd7f7a011ed2b5bf7fc86df1c4b634c8d
SHA3-384 hash: b863ca47f46f49f52d221c3404df9bf9e500a80aea27dba944671a274a13d11f514af4d81fb8f01bd026c82b93e51d98
SHA1 hash: a0aa2bea7ad211680d850e3c0a4079de9e6ca600
MD5 hash: 54dd9cd36da312f6c89d0a2cb0ac00aa
humanhash: nuts-moon-xray-friend
File name:file
Download: download sample
Signature DarkVisionRAT
File size:719'872 bytes
First seen:2026-03-06 21:05:09 UTC
Last seen:2026-03-07 01:02:35 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 59a9ef17b48ce0b3e398d1c5c81c194b (1 x DarkVisionRAT)
ssdeep 12288:viM7rr3MzfOwaZSHsR3d3QIS1zPA1QCaGpA+DBNWg7dilMu/KNYj/gCazB9sM7/u:viMf7QOcsdtQIzFaGxD7Wg7da/AYjk
Threatray 2'686 similar samples on MalwareBazaar
TLSH T1D2E40222FE4995BCC406C078C30156767B76B4CA1B32AAFF0295263C3F59AE56F38B54
TrID 33.1% (.EXE) Win64 Executable (generic) (6522/11/2)
25.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.4% (.ICL) Windows Icons Library (generic) (2059/9)
10.3% (.EXE) OS/2 Executable (generic) (2029/13)
10.1% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter Bitsight
Tags:DarkVisionRAT dropped-by-amadey exe fbf543


Avatar
Bitsight
url: http://158.94.211.222/files/8733674968/jLZuxmu.exe

Intelligence


File Origin
# of uploads :
14
# of downloads :
175
Origin country :
US US
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2026-03-06 21:06:01 UTC
Tags:
auto-reg

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.9%
Tags:
dropper emotet trojan remo
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug anti-vm explorer lolbin packed rust
Result
Gathering data
Gathering data
Result
Malware family:
donutloader
Score:
  10/10
Tags:
family:donutloader loader persistence ransomware
Behaviour
Checks SCSI registry key(s)
Enumerates system info in registry
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Uses Volume Shadow Copy WMI provider
Uses Volume Shadow Copy service COM API
Adds Run key to start application
Enumerates connected drives
Boot or Logon Autostart Execution: Active Setup
Detects DonutLoader
DonutLoader
Donutloader family
Unpacked files
SH256 hash:
6700075bf252fbc09453df6f543d36bbd7f7a011ed2b5bf7fc86df1c4b634c8d
MD5 hash:
54dd9cd36da312f6c89d0a2cb0ac00aa
SHA1 hash:
a0aa2bea7ad211680d850e3c0a4079de9e6ca600
Malware family:
DarkvisionRAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_Debugger
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:pe_detect_tls_callbacks
Rule name:ProgramLanguage_Rust
Author:albertzsigovits
Description:Application written in Rust programming language
Rule name:Rustyloader_mem_loose
Author:James_inthe_box
Description:Corroded buerloader
Reference:https://app.any.run/tasks/83064edd-c7eb-4558-85e8-621db72b2a24
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:TH_Generic_MassHunt_Win_Malware_2025_CYFARE
Author:CYFARE
Description:Generic Windows malware mass-hunt rule - 2025
Reference:https://cyfare.net/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DarkVisionRAT

Executable exe 6700075bf252fbc09453df6f543d36bbd7f7a011ed2b5bf7fc86df1c4b634c8d

(this sample)

  
Dropped by
Amadey
  
Delivery method
Distributed via web download

Comments