MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 70da4cb906561579f992801bfce2c3f1daf01833b292a9bd04545b7e0ee49fbd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DCRat


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: 70da4cb906561579f992801bfce2c3f1daf01833b292a9bd04545b7e0ee49fbd
SHA3-384 hash: 98c0879c9879a2831fcdf3142804dcf6ef07ba006c6500d0d46ed365e36f57a93ec2e78e3901ba26d415dce80872fd02
SHA1 hash: 8fab3f32aaba682f06fb2652d4c76ac35128b892
MD5 hash: 2a8c555d8063f4bdd3673185fb315f75
humanhash: india-tennis-double-rugby
File name:70da4cb906561579f992801bfce2c3f1daf01833b292a9bd04545b7e0ee49fbd
Download: download sample
Signature DCRat
File size:3'106'816 bytes
First seen:2021-03-01 16:57:45 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d59a4a699610169663a929d37c90be43 (75 x DCRat, 22 x njrat, 15 x SalatStealer)
ssdeep 49152:rHOAqhehrSXigqA/OlaOtFeWnwPO+FcQOL+RJa9yFa:ruA3H4YAs+SQTRJta
Threatray 400 similar samples on MalwareBazaar
TLSH 99E50141B291E675D3A12E32450BD67C1717AD16B722F32BAFACBE873D631358A007C6
Reporter c3rb3ru5d3d53c2
Tags:DCRat


Avatar
c3rb3ru5d3d53c
@c3rb3ru5d3d53c Live Hunt

Intelligence


File Origin
# of uploads :
1
# of downloads :
132
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
70da4cb906561579f992801bfce2c3f1daf01833b292a9bd04545b7e0ee49fbd
Verdict:
Suspicious activity
Analysis date:
2021-03-01 16:58:43 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a window
Searching for the window
Creating a file
Running batch commands
Creating a process with a hidden window
Sending a UDP request
Using the Windows Management Instrumentation requests
Launching a process
Creating a file in the Windows subdirectories
DNS request
Sending an HTTP GET request
Sending a custom TCP request
Deleting a recently created file
Reading critical registry keys
Unauthorized injection to a recently created process
Stealing user critical data
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains in memory code execution
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Drops executable to a common third party application directory
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Sigma detected: System File Execution Location Anomaly
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected DCRat
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 360281 Sample: Ej3P8ulMwz Startdate: 01/03/2021 Architecture: WINDOWS Score: 100 85 Found malware configuration 2->85 87 Antivirus detection for dropped file 2->87 89 Antivirus / Scanner detection for submitted sample 2->89 91 12 other signatures 2->91 14 Ej3P8ulMwz.exe 3 2->14         started        17 NYReAuzXOqzVUkr.exe 2->17         started        20 svcbroker.exe 2->20         started        process3 file4 71 C:\Users\user\AppData\Local\Temp\skley.exe, PE32 14->71 dropped 73 C:\Users\user\...mail Utilita v.3.exe, PE32+ 14->73 dropped 22 skley.exe 3 6 14->22         started        26 Email Utilita v.3.exe 3 14->26         started        81 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 17->81 signatures5 process6 file7 61 C:\svcnet\wt5PReUQn3JKtsXaSVpT.exe, PE32 22->61 dropped 93 Antivirus detection for dropped file 22->93 95 Multi AV Scanner detection for dropped file 22->95 28 wscript.exe 1 22->28         started        signatures8 process9 process10 30 cmd.exe 1 28->30         started        process11 32 wt5PReUQn3JKtsXaSVpT.exe 6 30->32         started        36 conhost.exe 30->36         started        file12 59 C:\svcnet\svcbroker.exe, PE32 32->59 dropped 83 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 32->83 38 wscript.exe 1 32->38         started        signatures13 process14 process15 40 cmd.exe 38->40         started        process16 42 svcbroker.exe 40->42         started        46 conhost.exe 40->46         started        file17 63 C:\svcnet\RuntimeBroker.exe, PE32 42->63 dropped 65 C:\svcnet65YReAuzXOqzVUkr.exe, PE32 42->65 dropped 67 C:\Recovery\RuntimeBroker.exe, PE32 42->67 dropped 69 4 other files (3 malicious) 42->69 dropped 97 Antivirus detection for dropped file 42->97 99 Machine Learning detection for dropped file 42->99 101 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 42->101 103 2 other signatures 42->103 48 RuntimeBroker.exe 42->48         started        51 schtasks.exe 42->51         started        53 schtasks.exe 42->53         started        55 5 other processes 42->55 signatures18 process19 signatures20 75 Antivirus detection for dropped file 48->75 77 Machine Learning detection for dropped file 48->77 79 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 48->79 57 conhost.exe 51->57         started        process21
Threat name:
Win32.Trojan.Delf
Status:
Malicious
First seen:
2021-03-01 16:58:07 UTC
File Type:
PE (Exe)
Extracted files:
145
AV detection:
42 of 48 (87.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
spyware upx
Behaviour
Creates scheduled task(s)
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Accesses cryptocurrency files/wallets, possible credential harvesting
Looks up external IP address via web service
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
UPX packed file
Unpacked files
SH256 hash:
78f7cd4a4b5c55163b29b23c478e5fb9c617a16a14e8be0a6749d3b99042e808
MD5 hash:
84e4f8e8e8bcdd5c31f36f99c890ccbc
SHA1 hash:
8f512c9c110235129ce07042f22dfbbb627ae824
SH256 hash:
32fa27a675c9a6371ef3c378bc49f0e50cbca0fa85faf90c51559090eb523961
MD5 hash:
cea1803314d01a38982b01b10e719c5f
SHA1 hash:
ad0fa556479c5036a962e5d072a85d90dbfced42
SH256 hash:
70da4cb906561579f992801bfce2c3f1daf01833b292a9bd04545b7e0ee49fbd
MD5 hash:
2a8c555d8063f4bdd3673185fb315f75
SHA1 hash:
8fab3f32aaba682f06fb2652d4c76ac35128b892
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:enterpriseunix
Author:Tim Brown @timb_machine
Description:Enterprise UNIX

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments