MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7c94ffaf6d76f18ce6bfc6039f9252a4b71d79e483d822aeab0de9b3189b6d0e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DCRat


Vendor detections: 16


Intelligence 16 IOCs YARA 5 File information Comments

SHA256 hash: 7c94ffaf6d76f18ce6bfc6039f9252a4b71d79e483d822aeab0de9b3189b6d0e
SHA3-384 hash: 649638ed7f7b74f9c35109f1230336df8924d2cb2d0188d378a97729abf443bbf11d596633fd4174217e16771c7b514e
SHA1 hash: 89a3961bb7b5e29ce53cfc9bb64daa216259a85e
MD5 hash: 0b31dc8d9eeaa4a6803873a6c1380c72
humanhash: thirteen-island-timing-burger
File name:0b31dc8d9eeaa4a6803873a6c1380c72.exe
Download: download sample
Signature DCRat
File size:216'064 bytes
First seen:2024-02-25 22:45:15 UTC
Last seen:2024-02-26 00:37:37 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 31ecd6687d76b6ffcffcaad60df2b1c6 (1 x DCRat)
ssdeep 3072:gyJtJkIZYF/TgVdkyrp90TvT5A70CutWTFlEz/BVwNMtyMz7:gyDahrgVdjrpc5EJkQMz
TLSH T13D24AE1023D4C071D19B24F085A4CBF54EBBF87262B19A8F5FD6DE7E4F26691922438D
TrID 37.3% (.EXE) Win64 Executable (generic) (10523/12/4)
17.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
15.9% (.EXE) Win32 Executable (generic) (4504/4/1)
7.3% (.ICL) Windows Icons Library (generic) (2059/9)
7.2% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 3370ecd2ccf033da (7 x Stealc, 3 x Smoke Loader, 2 x RiseProStealer)
Reporter abuse_ch
Tags:DCRat exe


Avatar
abuse_ch
DCRat C2:
http://80.85.246.217/externalpipeToSecureasynctrackUploads.php

Intelligence


File Origin
# of uploads :
2
# of downloads :
399
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Connection attempt to an infection source
DNS request
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Creating a file in the %temp% directory
Creating a process from a recently created file
Searching for synchronization primitives
Using the Windows Management Instrumentation requests
Running batch commands
Creating a process with a hidden window
Launching a process
Query of malicious DNS domain
Enabling autorun with the shell\open\command registry branches
Forced shutdown of a system process
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
fingerprint packed smokeloader
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
LummaC, Babuk, Clipboard Hijacker, Djvu,
Detection:
malicious
Classification:
rans.troj.spyw.expl.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found ransom note / readme
Found Tor onion address
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sigma detected: Bypass UAC via Fodhelper.exe
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
UAC bypass detected (Fodhelper)
Uses cmd line tools excessively to alter registry or file data
Uses schtasks.exe or at.exe to add and modify task schedules
Writes a notice file (html or txt) to demand a ransom
Yara detected AntiVM3
Yara detected Babuk Ransomware
Yara detected Clipboard Hijacker
Yara detected Djvu Ransomware
Yara detected Generic Downloader
Yara detected Glupteba
Yara detected LummaC Stealer
Yara detected PureLog Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1398444 Sample: sE76IBM72M.exe Startdate: 25/02/2024 Architecture: WINDOWS Score: 100 133 valowaves.com 2->133 135 trypokemon.com 2->135 137 13 other IPs or domains 2->137 157 Snort IDS alert for network traffic 2->157 159 Multi AV Scanner detection for domain / URL 2->159 161 Found malware configuration 2->161 163 21 other signatures 2->163 13 sE76IBM72M.exe 2->13         started        16 7FBD.exe 2->16         started        18 vejvbhr 2->18         started        20 2 other processes 2->20 signatures3 process4 signatures5 217 Detected unpacking (changes PE section rights) 13->217 219 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 13->219 221 Maps a DLL or memory area into another process 13->221 223 Creates a thread in another existing process (thread injection) 13->223 22 explorer.exe 50 22 13->22 injected 225 Antivirus detection for dropped file 16->225 227 Detected unpacking (overwrites its own PE header) 16->227 229 Machine Learning detection for dropped file 16->229 231 Writes a notice file (html or txt) to demand a ransom 16->231 27 7FBD.exe 16->27         started        233 Multi AV Scanner detection for dropped file 18->233 235 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 18->235 237 Checks if the current machine is a virtual machine (disk enumeration) 18->237 29 schtasks.exe 18->29         started        239 Injects a PE file into a foreign processes 20->239 31 mstsca.exe 20->31         started        33 mstsca.exe 20->33         started        process6 dnsIp7 139 m2reg.ulm.ac.id 103.23.232.80, 49781, 80 UNLAM-AS-IDUniversitasLambungMangkuratID Indonesia 22->139 141 lucasowen.com.tr 185.50.70.125 OSBILCY Cyprus 22->141 143 7 other IPs or domains 22->143 103 C:\Users\user\AppData\Roaming\vejvbhr, PE32 22->103 dropped 105 C:\Users\user\AppData\Local\TempC6E.exe, PE32 22->105 dropped 107 C:\Users\user\AppData\Local\Temp\D68A.exe, PE32 22->107 dropped 117 6 other malicious files 22->117 dropped 207 System process connects to network (likely due to code injection or exploit) 22->207 209 Benign windows process drops PE files 22->209 211 Deletes itself after installation 22->211 213 Hides that the sample has been downloaded from the Internet (zone.identifier) 22->213 35 7FBD.exe 22->35         started        38 CEA.exe 22->38         started        41 75C8.exe 22->41         started        47 4 other processes 22->47 109 C:\Users\user\_README.txt, ASCII 27->109 dropped 111 C:\Users\user\Desktop\...\DVWHKMNFNN.png, data 27->111 dropped 113 C:\Users\user\Desktop\VLZDGUKUTZ.docx, data 27->113 dropped 115 C:\Users\user\AppData\Local\...\_README.txt, ASCII 27->115 dropped 215 Modifies existing user documents (likely ransomware behavior) 27->215 43 conhost.exe 29->43         started        45 schtasks.exe 31->45         started        file8 signatures9 process10 dnsIp11 165 Antivirus detection for dropped file 35->165 167 Detected unpacking (changes PE section rights) 35->167 169 Detected unpacking (overwrites its own PE header) 35->169 185 2 other signatures 35->185 49 7FBD.exe 1 16 35->49         started        145 resergvearyinitiani.shop 104.21.94.2 CLOUDFLARENETUS United States 38->145 171 Multi AV Scanner detection for dropped file 38->171 173 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 38->173 175 Query firmware table information (likely to detect VMs) 38->175 187 4 other signatures 38->187 177 UAC bypass detected (Fodhelper) 41->177 179 Machine Learning detection for dropped file 41->179 181 Found Tor onion address 41->181 183 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 41->183 53 cmd.exe 41->53         started        55 conhost.exe 45->55         started        189 3 other signatures 47->189 57 conhost.exe 47->57         started        59 reg.exe 1 1 47->59         started        61 7FBD.exe 47->61         started        63 4 other processes 47->63 signatures12 process13 dnsIp14 131 api.2ip.ua 104.21.65.24, 443, 49750, 49756 CLOUDFLARENETUS United States 49->131 101 C:\Users\user\AppData\Local\...\7FBD.exe, PE32 49->101 dropped 65 7FBD.exe 49->65         started        68 icacls.exe 49->68         started        70 fodhelper.exe 53->70         started        72 conhost.exe 53->72         started        74 fodhelper.exe 53->74         started        76 fodhelper.exe 53->76         started        file15 process16 signatures17 155 Injects a PE file into a foreign processes 65->155 78 7FBD.exe 1 23 65->78         started        83 75C8.exe 70->83         started        process18 dnsIp19 151 habrafa.com 2.180.10.7, 49766, 49767, 49769 TCIIR Iran (ISLAMIC Republic Of) 78->151 123 C:\Users\user\AppData\Local\...\build3.exe, PE32 78->123 dropped 125 C:\Users\user\AppData\Local\...\build2.exe, PE32 78->125 dropped 127 C:\Users\user\AppData\Local\...\build3[1].exe, PE32 78->127 dropped 129 5 other malicious files 78->129 dropped 153 Modifies existing user documents (likely ransomware behavior) 78->153 85 build2.exe 78->85         started        88 build3.exe 78->88         started        90 powershell.exe 83->90         started        file20 signatures21 process22 signatures23 191 Antivirus detection for dropped file 85->191 193 Multi AV Scanner detection for dropped file 85->193 195 Detected unpacking (changes PE section rights) 85->195 197 Injects a PE file into a foreign processes 85->197 92 build2.exe 85->92         started        199 Detected unpacking (overwrites its own PE header) 88->199 201 Machine Learning detection for dropped file 88->201 203 Uses schtasks.exe or at.exe to add and modify task schedules 88->203 205 Sample uses process hollowing technique 88->205 97 build3.exe 88->97         started        99 conhost.exe 90->99         started        process24 dnsIp25 147 142.132.224.223, 49777, 49780, 49782 UNIVERSITYOFWINNIPEG-ASNCA Canada 92->147 149 t.me 149.154.167.99, 443, 49774 TELEGRAMRU United Kingdom 92->149 119 C:\Users\user\AppData\Local\...\sqlm[1].dll, PE32 92->119 dropped 241 Found many strings related to Crypto-Wallets (likely being stolen) 92->241 243 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 92->243 121 C:\Users\user\AppData\Roaming\...\mstsca.exe, PE32 97->121 dropped file26 signatures27
Threat name:
Win32.Trojan.SmokeLoader
Status:
Malicious
First seen:
2024-02-22 17:18:39 UTC
File Type:
PE (Exe)
Extracted files:
18
AV detection:
22 of 24 (91.67%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:dcrat family:djvu family:glupteba family:lumma family:smokeloader family:zgrat botnet:tfd5 backdoor discovery dropper evasion infostealer loader persistence ransomware rat stealer trojan upx
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Modifies data under HKEY_USERS
Modifies registry key
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Program crash
Launches sc.exe
Suspicious use of SetThreadContext
Adds Run key to start application
Looks up external IP address via web service
Checks computer location settings
Deletes itself
Executes dropped EXE
Loads dropped DLL
Modifies file permissions
UPX packed file
Downloads MZ/PE file
Modifies Windows Firewall
Possible attempt to disable PatchGuard
Modifies boot configuration data using bcdedit
DcRat
Detect ZGRat V1
Detected Djvu ransomware
Djvu Ransomware
Glupteba
Glupteba payload
Lumma Stealer
SmokeLoader
ZGRat
Malware Config
C2 Extraction:
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
http://habrafa.com/test1/get.php
https://resergvearyinitiani.shop/api
https://technologyenterdo.shop/api
https://detectordiscusser.shop/api
https://turkeyunlikelyofw.shop/api
https://associationokeo.shop/api
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments