MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 97c8904e0e2da52a0021dabc7d281eab4341a36e6dd94b7d98a4c1c3eee4ba1e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DCRat


Vendor detections: 14


Intelligence 14 IOCs YARA 6 File information Comments

SHA256 hash: 97c8904e0e2da52a0021dabc7d281eab4341a36e6dd94b7d98a4c1c3eee4ba1e
SHA3-384 hash: fe661bbdfd891ff494bdc789f4f15b3bb539af569044d5425616fbd415af8828e3a14c525623f6f32031066b07e30a33
SHA1 hash: 713ec6a2c7724ea023803c40b3cc23eda5e6004c
MD5 hash: a3d53c95c5d457e510e89cd2f1288387
humanhash: crazy-oregon-fourteen-mockingbird
File name:97C8904E0E2DA52A0021DABC7D281EAB4341A36E6DD94.exe
Download: download sample
Signature DCRat
File size:2'359'808 bytes
First seen:2024-01-17 16:55:10 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'609 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 49152:SW2cXK7xPrZz+NvK8IVYmdRMHHE3Ym57ThBHZok6tA8onR1lQY:R2hEZIVYxHk1XhBatANHK
Threatray 241 similar samples on MalwareBazaar
TLSH T167B5C01665A14E33C2685B768297013E93A0D7263612FB0F366F61D278077F18EB26F7
TrID 60.4% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.8% (.SCR) Windows screen saver (13097/50/3)
8.7% (.EXE) Win64 Executable (generic) (10523/12/4)
5.4% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
Reporter abuse_ch
Tags:DCRat exe


Avatar
abuse_ch
DCRat C2:
http://977789cm.nyashland.top/bigloadMultiDefaultUploadsdownloads.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
396
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
97c8904e0e2da52a0021dabc7d281eab4341a36e6dd94b7d98a4c1c3eee4ba1e.exe
Verdict:
Malicious activity
Analysis date:
2024-01-17 16:56:43 UTC
Tags:
dcrat rat backdoor remote stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DCRat, zgRAT
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected DCRat
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1376232 Sample: 97C8904E0E2DA52A0021DABC7D2... Startdate: 17/01/2024 Architecture: WINDOWS Score: 100 109 977789cm.nyashland.top 2->109 121 Snort IDS alert for network traffic 2->121 123 Antivirus detection for URL or domain 2->123 125 Antivirus detection for dropped file 2->125 127 8 other signatures 2->127 15 97C8904E0E2DA52A0021DABC7D281EAB4341A36E6DD94.exe 4 27 2->15         started        signatures3 process4 file5 101 C:\Users\user\Desktop\uYkIAYsg.log, PE32 15->101 dropped 103 C:\Users\user\Desktop\UnLnwsxk.log, PE32 15->103 dropped 105 C:\Users\user\Desktop\UWEViWEh.log, PE32 15->105 dropped 107 8 other malicious files 15->107 dropped 18 cmd.exe 1 15->18         started        process6 signatures7 115 Uses ping.exe to sleep 18->115 117 Uses ping.exe to check the status of other devices and networks 18->117 21 syMAfdKQoBDXQhUcK.exe 14 11 18->21         started        26 w32tm.exe 1 18->26         started        28 conhost.exe 18->28         started        30 chcp.com 1 18->30         started        process8 dnsIp9 111 977789cm.nyashland.top 172.67.129.42, 49729, 49736, 49737 CLOUDFLARENETUS United States 21->111 77 C:\Users\user\Desktop\qMGjPmcW.log, PE32 21->77 dropped 79 C:\Users\user\Desktop\oKUBuDXb.log, PE32 21->79 dropped 81 C:\Users\user\Desktop\hdnTgJWp.log, PE32 21->81 dropped 83 3 other malicious files 21->83 dropped 129 Multi AV Scanner detection for dropped file 21->129 32 cmd.exe 1 21->32         started        file10 signatures11 process12 signatures13 113 Uses ping.exe to sleep 32->113 35 syMAfdKQoBDXQhUcK.exe 10 32->35         started        38 conhost.exe 32->38         started        40 PING.EXE 1 32->40         started        42 chcp.com 1 32->42         started        process14 file15 69 C:\Users\user\Desktop\qlgBKhCq.log, PE32 35->69 dropped 71 C:\Users\user\Desktop\YHxdcpoZ.log, PE32 35->71 dropped 73 C:\Users\user\Desktop\RbQwOwnn.log, PE32 35->73 dropped 75 3 other malicious files 35->75 dropped 44 cmd.exe 35->44         started        process16 process17 46 syMAfdKQoBDXQhUcK.exe 44->46         started        49 conhost.exe 44->49         started        51 chcp.com 44->51         started        53 w32tm.exe 44->53         started        file18 93 C:\Users\user\Desktop\oWdlvuBc.log, PE32 46->93 dropped 95 C:\Users\user\Desktop\hYplTgGn.log, PE32 46->95 dropped 97 C:\Users\user\Desktop\XyGnNmcL.log, PE32 46->97 dropped 99 3 other malicious files 46->99 dropped 55 cmd.exe 46->55         started        process19 process20 57 syMAfdKQoBDXQhUcK.exe 55->57         started        60 conhost.exe 55->60         started        62 chcp.com 55->62         started        64 w32tm.exe 55->64         started        file21 85 C:\Users\user\Desktop\yTqitPoi.log, PE32 57->85 dropped 87 C:\Users\user\Desktop\kxFTgqTN.log, PE32 57->87 dropped 89 C:\Users\user\Desktop\aPmDxOOf.log, PE32 57->89 dropped 91 3 other malicious files 57->91 dropped 66 cmd.exe 57->66         started        process22 signatures23 119 Uses ping.exe to sleep 66->119
Threat name:
ByteCode-MSIL.Trojan.DCRat
Status:
Malicious
First seen:
2024-01-16 00:52:00 UTC
File Type:
PE (.Net Exe)
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:zgrat rat
Behaviour
Modifies registry class
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Checks computer location settings
Executes dropped EXE
Detect ZGRat V1
ZGRat
Unpacked files
SH256 hash:
97c8904e0e2da52a0021dabc7d281eab4341a36e6dd94b7d98a4c1c3eee4ba1e
MD5 hash:
a3d53c95c5d457e510e89cd2f1288387
SHA1 hash:
713ec6a2c7724ea023803c40b3cc23eda5e6004c
Detections:
INDICATOR_EXE_Packed_DotNetReactor
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_DotNetReactor
Author:ditekSHen
Description:Detects executables packed with unregistered version of .NET Reactor
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:reverse_http
Author:CD_R0M_
Description:Identify strings with http reversed (ptth)
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments