MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8a4351200638f68995aaaef923393851321e4064508e9aed734224617cc5d69d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DCRat


Vendor detections: 15


Intelligence 15 IOCs 1 YARA 17 File information Comments

SHA256 hash: 8a4351200638f68995aaaef923393851321e4064508e9aed734224617cc5d69d
SHA3-384 hash: 7691db694a5aa121f7cbff3e05758a62691ceb5f241e86ccd666a72ab4b6483f028bb77de6bb3c842c4acb2ff6a74486
SHA1 hash: b55c5c6be9ff3da8afff3ea19f5f85134666130c
MD5 hash: 082e99096620a154300ee50f39666eef
humanhash: wolfram-bulldog-october-massachusetts
File name:082E99096620A154300EE50F39666EEF.exe
Download: download sample
Signature DCRat
File size:8'872'960 bytes
First seen:2024-12-02 19:20:11 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d59a4a699610169663a929d37c90be43 (75 x DCRat, 22 x njrat, 15 x SalatStealer)
ssdeep 196608:ai8S8ETgMsbrgbLO0Ejc4egHsu8Y5e3km6Nsr:n8sgPHr0EjcTK84e3km6Nsr
TLSH T1A696E0217246C937C27216B0197C8A5F9238AF321BB299CB73CC2D6E5B745D20736E67
TrID 65.7% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
14.2% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
10.6% (.EXE) InstallShield setup (43053/19/16)
3.5% (.EXE) Win32 Executable Delphi generic (14182/79/4)
2.6% (.EXE) Win64 Executable (generic) (10522/11/4)
Magika pebin
Reporter abuse_ch
Tags:DCRat exe


Avatar
abuse_ch
DCRat C2:
http://77.222.47.117/packetrequestdownloads/0/defaultimage/_/universalProvider/0DownloadsWordpress/8ProtonBigloadlongpoll/privatePublicTrack/dump/Uploads/VideoPipeProcessorDefault.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://77.222.47.117/packetrequestdownloads/0/defaultimage/_/universalProvider/0DownloadsWordpress/8ProtonBigloadlongpoll/privatePublicTrack/dump/Uploads/VideoPipeProcessorDefault.php https://threatfox.abuse.ch/ioc/1350050/

Intelligence


File Origin
# of uploads :
1
# of downloads :
491
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
082E99096620A154300EE50F39666EEF.exe
Verdict:
Malicious activity
Analysis date:
2024-12-02 19:27:58 UTC
Tags:
rat dcrat remote darkcrystal

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
phishing autorun
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a window
Searching for synchronization primitives
Creating a file
DNS request
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Launching a process
Running batch commands
Creating a process with a hidden window
Loading a suspicious library
Creating a file in the Program Files subdirectories
Using the Windows Management Instrumentation requests
Unauthorized injection to a recently created process
Enabling autorun by creating a file
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm borland_delphi fingerprint lolbin msiexec obfuscated packed packed packed packer_detected runonce
Result
Threat name:
DCRat, PureLog Stealer, zgRAT
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates processes via WMI
Drops executable to a common third party application directory
Found malware configuration
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Schedule system process
Sigma detected: System File Execution Location Anomaly
Suricata IDS alerts for network traffic
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Yara detected DCRat
Yara detected PureLog Stealer
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1566926 Sample: 00onP4lQDK.exe Startdate: 02/12/2024 Architecture: WINDOWS Score: 100 104 cdn.semkrill.ru 2->104 118 Suricata IDS alerts for network traffic 2->118 120 Found malware configuration 2->120 122 Antivirus detection for URL or domain 2->122 124 14 other signatures 2->124 12 00onP4lQDK.exe 3 2->12         started        15 KqnetQAijGqs.exe 2->15         started        19 msiexec.exe 2->19         started        21 KqnetQAijGqs.exe 2->21         started        signatures3 process4 dnsIp5 92 C:\Users\...\SandeLLoCHECKER_Installer.exe, PE32 12->92 dropped 94 C:\Users\user\AppData\Local\Temp\1313.exe, PE32 12->94 dropped 23 1313.exe 3 6 12->23         started        27 SandeLLoCHECKER_Installer.exe 46 12->27         started        108 77.222.47.117, 49744, 49749, 49755 SWEB-ASRU Russian Federation 15->108 96 C:\Users\user\Desktop\xmqDYpsM.log, PE32 15->96 dropped 98 C:\Users\user\Desktop\szYFvscY.log, PE32 15->98 dropped 100 C:\Users\user\Desktop\jHhpbdEt.log, PE32 15->100 dropped 102 7 other malicious files 15->102 dropped 110 Multi AV Scanner detection for dropped file 15->110 112 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 15->112 114 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 15->114 30 msiexec.exe 19->30         started        32 msiexec.exe 19->32         started        file6 signatures7 process8 dnsIp9 72 C:\...\providerBrowser.exe, PE32 23->72 dropped 74 C:\...\9TzQXyTHgoob29sazyfZEid.vbe, data 23->74 dropped 126 Antivirus detection for dropped file 23->126 128 Multi AV Scanner detection for dropped file 23->128 130 Machine Learning detection for dropped file 23->130 34 wscript.exe 1 23->34         started        106 cdn.semkrill.ru 172.67.184.109, 443, 49704 CLOUDFLARENETUS United States 27->106 76 C:\Users\user\AppData\Local\...\MSI2E96.tmp, PE32 27->76 dropped 78 C:\Users\user\AppData\Local\...\MSI2DDA.tmp, PE32 27->78 dropped 80 C:\Users\user\AppData\Local\...\MSI2C14.tmp, PE32 27->80 dropped 82 5 other files (4 malicious) 27->82 dropped 37 msiexec.exe 11 27->37         started        file10 signatures11 process12 file13 116 Windows Scripting host queries suspicious COM object (likely to drop second stage) 34->116 40 cmd.exe 1 34->40         started        64 C:\Users\user\AppData\Local\...\MSI3493.tmp, PE32 37->64 dropped 66 C:\Users\user\AppData\Local\...\MSI3473.tmp, PE32 37->66 dropped 68 C:\Users\user\AppData\Local\...\MSI3434.tmp, PE32 37->68 dropped 70 5 other malicious files 37->70 dropped signatures14 process15 process16 42 providerBrowser.exe 3 26 40->42         started        46 conhost.exe 40->46         started        file17 84 C:\Windows\Fonts\WmiPrvSE.exe, PE32 42->84 dropped 86 C:\Users\user\Desktop\zKPUXNNX.log, PE32 42->86 dropped 88 C:\Users\user\Desktop\uWxVuRxj.log, PE32 42->88 dropped 90 13 other malicious files 42->90 dropped 132 Antivirus detection for dropped file 42->132 134 Multi AV Scanner detection for dropped file 42->134 136 Machine Learning detection for dropped file 42->136 138 3 other signatures 42->138 48 cmd.exe 42->48         started        50 schtasks.exe 42->50         started        52 schtasks.exe 42->52         started        54 13 other processes 42->54 signatures18 process19 process20 56 conhost.exe 48->56         started        58 chcp.com 48->58         started        60 w32tm.exe 48->60         started        62 winlogon.exe 48->62         started       
Threat name:
Win32.Trojan.DCRat
Status:
Malicious
First seen:
2024-11-30 09:32:20 UTC
File Type:
PE (Exe)
Extracted files:
230
AV detection:
37 of 38 (97.37%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery
Behaviour
Modifies Control Panel
Modifies registry class
Modifies system certificate store
Runs ping.exe
Scheduled Task/Job: Scheduled Task
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Drops file in Program Files directory
Drops file in Windows directory
Enumerates connected drives
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Process spawned unexpected child process
Verdict:
Malicious
Tags:
DCRat Win.Packed.Uztuby-10009381-0
YARA:
n/a
Unpacked files
SH256 hash:
6fb2faac08f55bdf18f3fcee44c383b877f416b97085dbee4746300723f3304f
MD5 hash:
06442f43e1001d860c8a19a752f19085
SHA1 hash:
9fbdc199e56bc7371292aa1a25cf4f8a6f49bb6d
SH256 hash:
2b93377ea087225820a9f8e4f331005a0c600d557242366f06e0c1eae003d669
MD5 hash:
d8bf2a0481c0a17a634d066a711c12e9
SHA1 hash:
7cc01a58831ed109f85b64fe4920278cedf3e38d
SH256 hash:
58da10ecd88af720a364610dc1acdfca455aa61ccc25c92c551e3c140545d284
MD5 hash:
d914fd15a06233e461ae840b9207b59b
SHA1 hash:
fc4d6b743633dffcbd0e583b9002fb2cf8b0e57f
SH256 hash:
9102f93333a3c594fbab564636efbe44ca5f0c4fb73726e319ba1d4990d089ec
MD5 hash:
5e5f246c65ac3b30cd0f6522f72dad74
SHA1 hash:
bf47412b2082b7b5648d93cf68e1c50aa35ee4ca
SH256 hash:
a1978472c82135e7752c177d2fd1f88d8cd07e71c30f3e3a40502386d3dff109
MD5 hash:
3c711a0a74e8c5fc89548f05b1f67a6b
SHA1 hash:
f37eac32a9327987af2f4a59a7a36c79dd453e75
Detections:
INDICATOR_EXE_Packed_DotNetReactor SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
c39c4466f622b7320076076ea3eb13fa0f784b9b097dff46d802f905fc39d851
MD5 hash:
a7993e5a520b17fec65435fb4838a08f
SHA1 hash:
18fe6286473a03735e7b701d4bfaf61ad35da7ad
SH256 hash:
8a4351200638f68995aaaef923393851321e4064508e9aed734224617cc5d69d
MD5 hash:
082e99096620a154300ee50f39666eef
SHA1 hash:
b55c5c6be9ff3da8afff3ea19f5f85134666130c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:APT_Sandworm_ArguePatch_Apr_2022_1
Author:Arkbird_SOLG
Description:Detect ArguePatch loader used by Sandworm group for load CaddyWiper
Reference:https://www.welivesecurity.com/2022/04/12/industroyer2-industroyer-reloaded/
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DotNet_Reactor
Author:@bartblaze
Description:Identifies .NET Reactor, which offers .NET code protection such as obfuscation, encryption and so on.
Rule name:INDICATOR_EXE_Packed_DotNetReactor
Author:ditekSHen
Description:Detects executables packed with unregistered version of .NET Reactor
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:PureCrypter
Author:@bartblaze
Description:Identifies PureCrypter, .NET loader and obfuscator.
Reference:https://malpedia.caad.fkie.fraunhofer.de/details/win.purecrypter
Rule name:RansomPyShield_Antiransomware
Author:XiAnzheng
Description:Check for Suspicious String and Import combination that Ransomware mostly abuse(can create FP)
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SelfExtractingRAR
Author:Xavier Mertens
Description:Detects an SFX archive with automatic script execution
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
SHELL_APIManipulates System Shellshell32.dll::ShellExecuteA
WIN32_PROCESS_APICan Create Process and Threadskernel32.dll::CloseHandle
WIN_BASE_IO_APICan Create Fileskernel32.dll::CreateFileA
kernel32.dll::GetWindowsDirectoryA
kernel32.dll::GetSystemDirectoryA
kernel32.dll::GetTempPathA

Comments