MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 6a25a9e6507be33ffb55afd80d51a2f00b761417f17ad6fe5399e36e78226c61. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
DCRat
Vendor detections: 7
| SHA256 hash: | 6a25a9e6507be33ffb55afd80d51a2f00b761417f17ad6fe5399e36e78226c61 |
|---|---|
| SHA3-384 hash: | a915c2965fe69837cc44f79fc27dff43a07d762025d5e7b795ff407cb6fa5b6f543631ce2fdfa00eb2396d65fe455a73 |
| SHA1 hash: | f5304f425592a5a1aa754ed56b9334e66c9fca8c |
| MD5 hash: | 17431b6c6fd49fd5d2d54ca7a4a689eb |
| humanhash: | winter-sweet-texas-bacon |
| File name: | 6a25a9e6507be33ffb55afd80d51a2f00b761417f17ad6fe5399e36e78226c61 |
| Download: | download sample |
| Signature | DCRat |
| File size: | 985'283 bytes |
| First seen: | 2021-02-28 07:23:20 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 4f67aeda01a0484282e8c59006b0b352 (51 x GuLoader, 9 x RemcosRAT, 9 x VIPKeylogger) |
| ssdeep | 24576:nH+m7hEdjbZ4HwyIrC8R6d1FcMTQ2nE+s/X1m:neVnZuw5xUdkMTP+Y |
| Threatray | 378 similar samples on MalwareBazaar |
| TLSH | 21252322902050B3DB9853325E79D776D2ABDED41D28160BABF59FFB7E389724342903 |
| Reporter | |
| Tags: | DCRat |
Intelligence
File Origin
# of uploads :
1
# of downloads :
402
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
6a25a9e6507be33ffb55afd80d51a2f00b761417f17ad6fe5399e36e78226c61
Verdict:
Malicious activity
Analysis date:
2021-02-28 07:43:06 UTC
Tags:
trojan rat backdoor dcrat evasion
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% directory
Creating a file
Creating a file in the %AppData% subdirectories
Deleting a recently created file
Creating a process from a recently created file
Creating a window
Searching for the window
Running batch commands
Creating a process with a hidden window
Sending a UDP request
Using the Windows Management Instrumentation requests
Launching a process
DNS request
Sending an HTTP GET request
Sending a custom TCP request
Reading critical registry keys
Enabling the 'hidden' option for recently created files
Unauthorized injection to a recently created process
Setting a global event handler for the keyboard
Creating a file in the mass storage device
Stealing user critical data
Enabling autorun by creating a file
Enabling threat expansion on mass storage devices by creating the autorun.inf autorun file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DCRat
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains in memory code execution
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Antivirus detection for dropped file
Creates files inside the volume driver (system volume information)
Drops executable to a common third party application directory
Drops PE files with benign system names
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected DCRat
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Phonzy
Status:
Malicious
First seen:
2021-02-27 09:30:36 UTC
AV detection:
31 of 48 (64.58%)
Threat level:
5/5
Verdict:
malicious
Similar samples:
+ 368 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
8/10
Tags:
spyware upx
Behaviour
Creates scheduled task(s)
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Accesses cryptocurrency files/wallets, possible credential harvesting
Looks up external IP address via web service
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
UPX packed file
Unpacked files
SH256 hash:
6e17879dc9cc54f58b9ff826a5bc64f8a6ffc7f0a1932db9516f428871690ffb
MD5 hash:
5c47db183fcf4ee0cc2364c4f7b322f8
SHA1 hash:
b59d228d2d22e0874aebda162f0e84d699ba9181
SH256 hash:
b8f5033f762e55c4d991ee5367c3d6d5caf9b64a7b081874576c5633dde5375f
MD5 hash:
78c11b5b9c402706b1a3e6ae77caf1ce
SHA1 hash:
8b0d2f251846bad4753bd81d9a92c84f8f47f2d9
SH256 hash:
2ffe1ac2555e822b4a383996168031e456f09f9cf3bb763fccee35be178cf58a
MD5 hash:
ba4c1dfe226d573d516c0529f263011e
SHA1 hash:
d726e947633ea75c09bba1cb6a14a79ce953be24
SH256 hash:
acb79c55b3b9c460d032a6f3aaf6c642bf8c1d450e23279d091cc0c6ca510973
MD5 hash:
2880bf3bbbc8dcaeb4367df8a30f01a8
SHA1 hash:
cb5c65eae4ae923514a67c95ada2d33b0c3f2118
SH256 hash:
227a4fc9408a44faa5eca608a974bd536814f97b8a4d28b4cac479727167b026
MD5 hash:
bd393029cc49b415b6c9aeb8a4936516
SHA1 hash:
c67fd92fffd18941bed41bfd6ac4f3b04fd123df
SH256 hash:
ada2f1b1bd5f70e1244c7ed20d33ecfbdc85825221a28d8d4d60a18a9bbf3b5c
MD5 hash:
7249d7e787faf606c97f162b93a62448
SHA1 hash:
2be8ed1664e6f97b996a1623e609e5e92f93bceb
SH256 hash:
2e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc
MD5 hash:
a4dd044bcd94e9b3370ccf095b31f896
SHA1 hash:
17c78201323ab2095bc53184aa8267c9187d5173
SH256 hash:
6a25a9e6507be33ffb55afd80d51a2f00b761417f17ad6fe5399e36e78226c61
MD5 hash:
17431b6c6fd49fd5d2d54ca7a4a689eb
SHA1 hash:
f5304f425592a5a1aa754ed56b9334e66c9fca8c
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.