MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 88c642b1fa43b77487f3916dd95ac236189971475c3289c745dc45a739e6453f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DCRat


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 88c642b1fa43b77487f3916dd95ac236189971475c3289c745dc45a739e6453f
SHA3-384 hash: 5050c3621c86f2587cadd32faef6156078b8da076f529b905dc576ab2037edf58849e1f647408288f229d421de4b957f
SHA1 hash: 0d506f9555aa68ddc5740652d477dd2e96a45e2b
MD5 hash: a6c8af48b5f7f850e5400cca5c288ae1
humanhash: sink-zulu-nebraska-thirteen
File name:a6c8af48b5f7f850e5400cca5c288ae1.exe
Download: download sample
Signature DCRat
File size:457'216 bytes
First seen:2021-08-01 07:00:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7182b1ea6f92adbf459a2c65d8d4dd9e (5 x CoinMiner, 4 x RedLineStealer, 4 x DCRat)
ssdeep 12288:AbjDhu9TsJYZBuLuM1reSNsX3Qku9EFBtsOciz4q4:u1eTsJZPNsXPu92Bts64q4
Threatray 118 similar samples on MalwareBazaar
TLSH T139A4F097B2E051A8EAF582F6D9921342EB3074711714B3DB57B943B61B2B9C58F3C3A0
Reporter abuse_ch
Tags:DCRat exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
1'348
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a6c8af48b5f7f850e5400cca5c288ae1.exe
Verdict:
No threats detected
Analysis date:
2021-08-01 07:05:13 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DCRat Xmrig
Detection:
malicious
Classification:
troj.evad.mine
Score:
100 / 100
Signature
.NET source code contains very large strings
Antivirus detection for dropped file
Disables security and backup related services
Drops executables to the windows directory (C:\Windows) and starts them
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Sigma detected: Schedule system process
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected BatToExe compiled binary
Yara detected DCRat
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 457445 Sample: wRMhuAGuqA.exe Startdate: 01/08/2021 Architecture: WINDOWS Score: 100 80 Antivirus detection for dropped file 2->80 82 Multi AV Scanner detection for dropped file 2->82 84 Multi AV Scanner detection for submitted file 2->84 86 8 other signatures 2->86 10 wRMhuAGuqA.exe 9 2->10         started        13 svchost.exe 1 2->13         started        15 svchost.exe 2->15         started        process3 file4 76 C:\Users\user\AppData\Local\Temp\...\extd.exe, PE32+ 10->76 dropped 17 cmd.exe 3 10->17         started        process5 process6 19 zxc.exe 1 18 17->19         started        23 vbn.exe 3 6 17->23         started        25 clo.exe 2 17->25         started        27 8 other processes 17->27 dnsIp7 62 C:\Windows\Client.exe, PE32 19->62 dropped 64 C:\Users\user\AppData\Local\...\nsProcess.dll, PE32 19->64 dropped 66 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 19->66 dropped 88 Multi AV Scanner detection for dropped file 19->88 90 Machine Learning detection for dropped file 19->90 92 Disables security and backup related services 19->92 30 cmd.exe 1 19->30         started        32 cmd.exe 19->32         started        34 cmd.exe 19->34         started        36 cmd.exe 19->36         started        68 C:\...\WinruntimedhcpNetcommon.exe, PE32 23->68 dropped 38 wscript.exe 23->38         started        94 Injects a PE file into a foreign processes 25->94 40 clo.exe 25->40         started        42 conhost.exe 25->42         started        78 cdn.discordapp.com 162.159.135.233, 443, 49743, 49749 CLOUDFLARENETUS United States 27->78 70 C:\Users\user\AppData\Local\Temp\...\zxc.exe, PE32 27->70 dropped 72 C:\Users\user\AppData\Local\Temp\...\vbn.exe, PE32 27->72 dropped 74 C:\Users\user\AppData\Local\Temp\...\clo.exe, PE32 27->74 dropped 96 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 27->96 file8 signatures9 process10 process11 44 net.exe 30->44         started        46 conhost.exe 30->46         started        48 conhost.exe 32->48         started        50 sc.exe 32->50         started        52 conhost.exe 34->52         started        54 sc.exe 34->54         started        56 conhost.exe 36->56         started        58 sc.exe 36->58         started        process12 60 net1.exe 44->60         started       
Threat name:
Win64.Trojan.Wacatac
Status:
Malicious
First seen:
2021-07-31 19:38:59 UTC
AV detection:
18 of 46 (39.13%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
suricata upx
Behaviour
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Loads dropped DLL
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
Unpacked files
SH256 hash:
88c642b1fa43b77487f3916dd95ac236189971475c3289c745dc45a739e6453f
MD5 hash:
a6c8af48b5f7f850e5400cca5c288ae1
SHA1 hash:
0d506f9555aa68ddc5740652d477dd2e96a45e2b
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DCRat

Executable exe 88c642b1fa43b77487f3916dd95ac236189971475c3289c745dc45a739e6453f

(this sample)

  
Delivery method
Distributed via web download

Comments