MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 684efa3246161dc6a58ebab74e56a1db300aaa63ce5e34fc41b0b50b90bc87d3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DCRat


Vendor detections: 16


Intelligence 16 IOCs YARA 29 File information Comments

SHA256 hash: 684efa3246161dc6a58ebab74e56a1db300aaa63ce5e34fc41b0b50b90bc87d3
SHA3-384 hash: 38673b4be6feb9dfd7417f5028b6f311d06fbf50a1c190946b7cc69168c690a250bf0dcabb975bc31b7273350ebe2a28
SHA1 hash: 9a426491d43c8350c29ac9767d99b87319febabb
MD5 hash: 4c6db42fb635d9aef809b0617918cedb
humanhash: ink-fillet-papa-earth
File name:4C6DB42FB635D9AEF809B0617918CEDB.exe
Download: download sample
Signature DCRat
File size:10'155'520 bytes
First seen:2024-04-07 01:40:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'750 x AgentTesla, 19'654 x Formbook, 12'248 x SnakeKeylogger)
ssdeep 196608:LlFMPfqmsrrk8TUjPVwKrwzV3c3pOVX7TLAHACUG5jV2f:B2erI8g9wZ32pygHAC/J2f
Threatray 87 similar samples on MalwareBazaar
TLSH T154A6330C7FE0C3ABDB8DD3F9A49119DA62F1E6C6F4268B99751D35B38B011A4D90360B
TrID 37.3% (.EXE) Win64 Executable (generic) (10523/12/4)
17.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
15.9% (.EXE) Win32 Executable (generic) (4504/4/1)
7.3% (.ICL) Windows Icons Library (generic) (2059/9)
7.2% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter abuse_ch
Tags:DCRat exe


Avatar
abuse_ch
DCRat C2:
http://267097cm.n9shteam1.top/bigloadTempcentralDownloads.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
353
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
684efa3246161dc6a58ebab74e56a1db300aaa63ce5e34fc41b0b50b90bc87d3.exe
Verdict:
Malicious activity
Analysis date:
2024-04-07 01:41:59 UTC
Tags:
evasion dcrat rat xworm backdoor remote stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Loading a suspicious library
Creating a file in the Windows subdirectories
Using the Windows Management Instrumentation requests
Launching a process
Running batch commands
Creating a process with a hidden window
DNS request
Connection attempt
Sending an HTTP GET request
Сreating synchronization primitives
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Creating a window
Searching for analyzing tools
Searching for the window
Searching for synchronization primitives
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun by creating a file
Enabling autorun
Adding an exclusion to Microsoft Defender
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DCRat, PureLog Stealer, zgRAT
Detection:
malicious
Classification:
spre.troj.spyw.expl.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
Check if machine is in data center or colocation facility
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Drops PE files to the user root directory
Drops PE files with benign system names
Hides threads from debuggers
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Execution from Suspicious Folder
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Program Location with Network Connections
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: System File Execution Location Anomaly
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Yara detected DCRat
Yara detected PureLog Stealer
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1421452 Sample: fLxh5LPKeO.exe Startdate: 07/04/2024 Architecture: WINDOWS Score: 100 133 951499cm.nyashtech.top 2->133 135 267097cm.n9shteam1.top 2->135 137 ip-api.com 2->137 171 Snort IDS alert for network traffic 2->171 173 Multi AV Scanner detection for domain / URL 2->173 175 Antivirus detection for URL or domain 2->175 177 21 other signatures 2->177 12 fLxh5LPKeO.exe 7 2->12         started        15 SFZztDMFPbIToVTZ.exe 2->15         started        18 SFZztDMFPbIToVTZ.exe 2->18         started        20 16 other processes 2->20 signatures3 process4 dnsIp5 119 C:\Users\user\AppData\Local\Temp\crypto.exe, PE32 12->119 dropped 121 C:\Users\user\AppData\Local\...\cruptox.exe, PE32 12->121 dropped 123 C:\Users\user\AppData\...behaviorgraphODLIClient.exe, PE32 12->123 dropped 23 cruptox.exe 3 6 12->23         started        27 crypto.exe 10 28 12->27         started        29 GODLIClient.exe 15 3 12->29         started        215 Multi AV Scanner detection for dropped file 15->215 143 127.0.0.1 unknown unknown 20->143 file6 signatures7 process8 dnsIp9 107 C:\...\MscontainerWebnetsvc.exe, PE32 23->107 dropped 109 Dmo0A7ifRGjus0Lc3C...Nl7YAGYZo0WGV8S.vbe, data 23->109 dropped 195 Multi AV Scanner detection for dropped file 23->195 32 wscript.exe 1 23->32         started        111 C:\Users\user\Desktop\lgOoscZT.log, PE32 27->111 dropped 113 C:\Users\user\Desktop\gswpQgKf.log, PE32 27->113 dropped 115 C:\Users\user\Desktop\bxvYIAUl.log, PE32 27->115 dropped 117 9 other malicious files 27->117 dropped 197 Creates an undocumented autostart registry key 27->197 199 Creates multiple autostart registry keys 27->199 201 Adds a directory exclusion to Windows Defender 27->201 203 Drops PE files with benign system names 27->203 35 cmd.exe 27->35         started        37 csc.exe 27->37         started        40 powershell.exe 27->40         started        46 5 other processes 27->46 145 ip-api.com 208.95.112.1, 49733, 80 TUT-ASUS United States 29->145 205 Antivirus detection for dropped file 29->205 207 Tries to detect sandboxes and other dynamic analysis tools (window names) 29->207 209 Machine Learning detection for dropped file 29->209 211 2 other signatures 29->211 42 powershell.exe 29->42         started        44 powershell.exe 29->44         started        file10 signatures11 process12 file13 151 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 32->151 153 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 32->153 155 Windows Scripting host queries suspicious COM object (likely to drop second stage) 32->155 48 cmd.exe 32->48         started        157 Uses ping.exe to sleep 35->157 159 Uses ping.exe to check the status of other devices and networks 35->159 50 spoolsv.exe 35->50         started        63 3 other processes 35->63 97 C:\Windows\...\SecurityHealthSystray.exe, PE32 37->97 dropped 161 Infects executable files (exe, dll, sys, html) 37->161 55 conhost.exe 37->55         started        57 cvtres.exe 37->57         started        59 conhost.exe 40->59         started        65 2 other processes 42->65 61 conhost.exe 44->61         started        67 5 other processes 46->67 signatures14 process15 dnsIp16 69 MscontainerWebnetsvc.exe 48->69         started        73 conhost.exe 48->73         started        139 951499cm.nyashtech.top 104.21.31.169, 49740, 49741, 49742 CLOUDFLARENETUS United States 50->139 141 172.67.178.175, 50030, 50080, 50237 CLOUDFLARENETUS United States 50->141 89 C:\Users\user\Desktop\tNlnVHSU.log, PE32 50->89 dropped 91 C:\Users\user\Desktop\rLzFAYOZ.log, PE32 50->91 dropped 93 C:\Users\user\Desktop\bBJiCmxF.log, PE32 50->93 dropped 95 2 other malicious files 50->95 dropped 179 Antivirus detection for dropped file 50->179 181 Multi AV Scanner detection for dropped file 50->181 183 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 50->183 185 2 other signatures 50->185 file17 signatures18 process19 file20 99 C:\Windows\INF\BITS\...\SFZztDMFPbIToVTZ.exe, PE32 69->99 dropped 101 C:\Users\user\conhost.exe, PE32 69->101 dropped 103 C:\Users\user\Desktop\sjEfUgpT.log, PE32 69->103 dropped 105 24 other malicious files 69->105 dropped 187 Antivirus detection for dropped file 69->187 189 Multi AV Scanner detection for dropped file 69->189 191 Machine Learning detection for dropped file 69->191 193 2 other signatures 69->193 75 cmd.exe 69->75         started        signatures21 process22 signatures23 213 Uses ping.exe to sleep 75->213 78 smss.exe 75->78         started        83 conhost.exe 75->83         started        85 chcp.com 75->85         started        87 PING.EXE 75->87         started        process24 dnsIp25 147 267097cm.n9shteam1.top 104.21.22.205, 49759, 49761, 49762 CLOUDFLARENETUS United States 78->147 149 172.67.206.236, 49870, 49939, 49986 CLOUDFLARENETUS United States 78->149 125 C:\Users\user\Desktop\qBqwnLIX.log, PE32 78->125 dropped 127 C:\Users\user\Desktop\pVWGghne.log, PE32 78->127 dropped 129 C:\Users\user\Desktop\nhSyuTrg.log, PE32 78->129 dropped 131 19 other malicious files 78->131 dropped 163 Antivirus detection for dropped file 78->163 165 Multi AV Scanner detection for dropped file 78->165 167 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 78->167 169 3 other signatures 78->169 file26 signatures27
Threat name:
Win32.Backdoor.AsyncRAT
Status:
Suspicious
First seen:
2024-04-03 20:24:31 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
27 of 38 (71.05%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xworm family:zgrat persistence rat spyware stealer trojan
Behaviour
Creates scheduled task(s)
Modifies registry class
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Detect Xworm Payload
Detect ZGRat V1
Modifies WinLogon for persistence
Process spawned unexpected child process
Xworm
ZGRat
Unpacked files
SH256 hash:
5153b60b002a0b82848661b6dc00df9e184ef2a3f800aac3e90f2f868b403c46
MD5 hash:
f99323ccbdf71989e975c21ef85ebe10
SHA1 hash:
bd71d9c530579b5944bfdd1a6a3b1b4f52f4eab3
SH256 hash:
812c8f8750255f343b12702dffa0d8f5cd293d4c37da30d4b1c95faf6bb78586
MD5 hash:
3d65c78fb1e85e81a8e7115560830ad0
SHA1 hash:
3ae83d340741cb24e612478c5d7b106b91b55437
Detections:
win_maze_a0 SUSP_XORed_URL_In_EXE
SH256 hash:
640f4b68522aef2804641e283dca84c0dcd26562b8568bd429c1659c9868ddee
MD5 hash:
061c2d51e325845c34ede9588914edec
SHA1 hash:
d3e0f0ee215a4e985489adca3c9608e6242c0edb
Detections:
INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File cn_utf8_windows_terminal
SH256 hash:
d7f85c4b788cc258c7ae646d93d0129b3ecee575e6cf6546569c1070f84c70d5
MD5 hash:
5abc604e668cf11611b12bcfbed68cbd
SHA1 hash:
0812116aae7a858f26bd03891f9ca2c21d8a86f2
SH256 hash:
684efa3246161dc6a58ebab74e56a1db300aaa63ce5e34fc41b0b50b90bc87d3
MD5 hash:
4c6db42fb635d9aef809b0617918cedb
SHA1 hash:
9a426491d43c8350c29ac9767d99b87319febabb
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:EnigmaStub
Author:@bartblaze
Description:Identifies Enigma packer stub.
Rule name:INDICATOR_EXE_Packed_DotNetReactor
Author:ditekSHen
Description:Detects executables packed with unregistered version of .NET Reactor
Rule name:INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Author:ditekSHen
Description:Detects Windows executables referencing non-Windows User-Agents
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MALWARE_Win_AsyncRAT
Author:ditekSHen
Description:Detects AsyncRAT
Rule name:MALWARE_Win_XWorm
Author:ditekSHen
Description:Detects XWorm
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:Multifamily_RAT_Detection
Author:Lucas Acha (http://www.lukeacha.com)
Description:Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:Njrat
Author:botherder https://github.com/botherder
Description:Njrat
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_imphash
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:PureCrypter
Author:@bartblaze
Description:Identifies PureCrypter, .NET loader and obfuscator.
Reference:https://malpedia.caad.fkie.fraunhofer.de/details/win.purecrypter
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:win_smominru_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.smominru.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments