MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 70d86fc8d1247dcd26ed0927411614973d45216d676978f768e14cb16d362536. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 70d86fc8d1247dcd26ed0927411614973d45216d676978f768e14cb16d362536
SHA3-384 hash: 0886ef32fe30c6c9097a8c350c82911f2d2fddbf76c64fe4b25595e3c202a06fe5ff7373fb0b400ecc1db690ce2b9f50
SHA1 hash: ed4910a3fe14f26a0a98ceb204ac054408c85a38
MD5 hash: 6d9e487ea1469c940f2533324beead56
humanhash: florida-delaware-quebec-eighteen
File name:70d86fc8d1247dcd26ed0927411614973d45216d676978f768e14cb16d362536
Download: download sample
File size:2'444'309 bytes
First seen:2020-06-10 07:32:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ae4ae436602a0fced8410c4c48e4ae05 (1 x DCRat)
ssdeep 49152:2+yvFDhff7AZqXPELX2Qpt1eU7GISsK0dS3vg/IAkKxO:+xAZqXPEz2UtgbISsbdYvpKw
Threatray 261 similar samples on MalwareBazaar
TLSH D1B52339B2C49A73E2B73F384E33705568BEBE111D68044B35DF9E1CBA395827D6424A
Reporter JAMESWT_WT

Intelligence


File Origin
# of uploads :
1
# of downloads :
63
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Ymacco
Status:
Malicious
First seen:
2020-06-03 01:03:46 UTC
File Type:
PE (Exe)
Extracted files:
27
AV detection:
26 of 31 (83.87%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:dcrat infostealer rat upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Modifies registry class
Program crash
Drops startup file
Loads dropped DLL
Executes dropped EXE
DC Rat Payload
ServiceHost packer
DcRat
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments