MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b8c9a273058d6214aeccc822fb5f304edc734bd57a4ac43450feeacef70fafb8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DCRat


Vendor detections: 17


Intelligence 17 IOCs 1 YARA 18 File information Comments

SHA256 hash: b8c9a273058d6214aeccc822fb5f304edc734bd57a4ac43450feeacef70fafb8
SHA3-384 hash: 49b40c90b77fde884e61881e6f04b2eeb288349fe8b4616ce8cbf63d55232d2c4dec223be95a603c7c046800ba72ff78
SHA1 hash: 0d1c5e913dcc60910e454416e3c149c9d05f02f5
MD5 hash: 8576f95a0e018025e8b46367ae311e83
humanhash: hot-gee-washington-ink
File name:8576F95A0E018025E8B46367AE311E83.exe
Download: download sample
Signature DCRat
File size:4'851'200 bytes
First seen:2024-12-15 03:15:12 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d59a4a699610169663a929d37c90be43 (76 x DCRat, 22 x njrat, 17 x SalatStealer)
ssdeep 98304:d++ALvAvoV3JDBQSBK5f7a6uBt9iofavIah:TmvvV5DpQ7a6ugoCvIw
TLSH T13826E005B6D08E33C2AE5732D5B7463C13F0E2617662EB0F364D15E66C077A1AE613AB
TrID 39.8% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
39.4% (.EXE) Win32 Executable Borland Delphi 6 (262638/61)
8.6% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
6.4% (.EXE) InstallShield setup (43053/19/16)
2.1% (.EXE) Win32 Executable Delphi generic (14182/79/4)
Magika pebin
Reporter abuse_ch
Tags:DCRat exe


Avatar
abuse_ch
DCRat C2:
http://nutipa.ru/_authGamewordpress.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://nutipa.ru/_authGamewordpress.php https://threatfox.abuse.ch/ioc/1356960/

Intelligence


File Origin
# of uploads :
1
# of downloads :
591
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
Solaraclear.exe
Verdict:
Malicious activity
Analysis date:
2024-12-09 03:27:25 UTC
Tags:
dcrat rat remote darkcrystal netreactor wmi-base64 api-base64 susp-powershell

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
virus micro sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a window
Searching for the window
Running batch commands
Searching for synchronization primitives
Launching a process
Creating a file
Creating a process with a hidden window
Loading a suspicious library
Sending a UDP request
Using the Windows Management Instrumentation requests
DNS request
Connection attempt
Sending an HTTP POST request
Unauthorized injection to a recently created process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm borland_delphi fingerprint lolbin macros-on-open msiexec obfuscated packed packed packed packer_detected wmic
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DCRat, PureLog Stealer, zgRAT
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Found malware configuration
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Files With System Process Name In Unsuspected Locations
Suricata IDS alerts for network traffic
Uses ipconfig to lookup or modify the Windows network settings
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Yara detected DCRat
Yara detected Powershell download and execute
Yara detected PureLog Stealer
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1575287 Sample: wmdqEYgW2i.exe Startdate: 15/12/2024 Architecture: WINDOWS Score: 100 82 nutipa.ru 2->82 84 www.nodejs.org 2->84 86 6 other IPs or domains 2->86 104 Multi AV Scanner detection for domain / URL 2->104 106 Suricata IDS alerts for network traffic 2->106 108 Found malware configuration 2->108 110 15 other signatures 2->110 12 wmdqEYgW2i.exe 3 2->12         started        signatures3 process4 file5 64 C:\Users\user\AppData\...\DCRatBuild.exe, PE32 12->64 dropped 66 C:\Users\user\AppData\...\Bootstrapper.exe, PE32+ 12->66 dropped 15 DCRatBuild.exe 3 6 12->15         started        19 Bootstrapper.exe 14 8 12->19         started        process6 dnsIp7 68 C:\ComponentReviewperfmonitor\Mscrt.exe, PE32 15->68 dropped 70 Uq2tX7p25HNYhIggX0...lwrHhzLqWtjOjit.vbe, data 15->70 dropped 98 Antivirus detection for dropped file 15->98 100 Multi AV Scanner detection for dropped file 15->100 102 Machine Learning detection for dropped file 15->102 22 wscript.exe 1 15->22         started        88 edge-term4-fra2.roblox.com 128.116.123.3, 443, 49733 ROBLOX-PRODUCTIONUS United States 19->88 90 www.nodejs.org 104.20.22.46, 443, 49734 CLOUDFLARENETUS United States 19->90 92 2 other IPs or domains 19->92 72 \Device\ConDrv, ISO-8859 19->72 dropped 25 cmd.exe 1 19->25         started        27 conhost.exe 19->27         started        29 WerFault.exe 19->29         started        file8 signatures9 process10 signatures11 112 Windows Scripting host queries suspicious COM object (likely to drop second stage) 22->112 31 cmd.exe 1 22->31         started        114 Uses ping.exe to sleep 25->114 116 Uses ping.exe to check the status of other devices and networks 25->116 118 Uses ipconfig to lookup or modify the Windows network settings 25->118 33 ipconfig.exe 1 25->33         started        35 conhost.exe 25->35         started        process12 process13 37 Mscrt.exe 3 39 31->37         started        41 conhost.exe 31->41         started        file14 56 C:\Users\user\Desktop\yxUOovbm.log, PE32 37->56 dropped 58 C:\Users\user\Desktop\peXGurXs.log, PE32 37->58 dropped 60 C:\Users\user\Desktop\pVzGKFEw.log, PE32 37->60 dropped 62 25 other malicious files 37->62 dropped 120 Antivirus detection for dropped file 37->120 122 Multi AV Scanner detection for dropped file 37->122 124 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 37->124 126 2 other signatures 37->126 43 cmd.exe 1 37->43         started        signatures15 process16 signatures17 128 Uses ping.exe to sleep 43->128 46 Mscrt.exe 43->46         started        50 conhost.exe 43->50         started        52 chcp.com 43->52         started        54 PING.EXE 43->54         started        process18 dnsIp19 94 nutipa.ru 172.67.185.214, 49743, 49744, 49745 CLOUDFLARENETUS United States 46->94 96 104.21.64.130, 49909, 80 CLOUDFLARENETUS United States 46->96 74 C:\Users\user\Desktop\xxLgnBHw.log, PE32 46->74 dropped 76 C:\Users\user\Desktop\wAkXRBsB.log, PE32 46->76 dropped 78 C:\Users\user\Desktop\vDJPwBdH.log, PE32 46->78 dropped 80 19 other malicious files 46->80 dropped file20
Threat name:
Win32.Trojan.DisguisedXMRigMiner
Status:
Malicious
First seen:
2024-12-09 06:28:37 UTC
File Type:
PE (Exe)
Extracted files:
27
AV detection:
24 of 24 (100.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:dcrat discovery infostealer rat
Behaviour
Gathers network information
Modifies data under HKEY_USERS
Modifies registry class
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Drops file in Program Files directory
Drops file in Windows directory
Blocklisted process makes network request
Enumerates connected drives
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Unexpected DNS network traffic destination
DcRat
Dcrat family
Verdict:
Malicious
Tags:
rat dcrat Win.Trojan.Uztuby-9855059-0
YARA:
MAL_EXE_DCRat_Jul_08_2
Unpacked files
SH256 hash:
e4a958444e72eb1b3be02f3a8bf29044a81f328405a4969a4f66515ef219774e
MD5 hash:
e7870cd0c30a52066c454c15a5a5a2f5
SHA1 hash:
fc64203e05c104a116e7e4c354c9ee77c99737d6
Detections:
INDICATOR_EXE_Packed_DotNetReactor SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
c39c4466f622b7320076076ea3eb13fa0f784b9b097dff46d802f905fc39d851
MD5 hash:
a7993e5a520b17fec65435fb4838a08f
SHA1 hash:
18fe6286473a03735e7b701d4bfaf61ad35da7ad
SH256 hash:
8f2e28588f2303bd8d7a9b0c3ff6a9cb16fa93f8ddc9c5e0666a8c12d6880ee3
MD5 hash:
02c70d9d6696950c198db93b7f6a835e
SHA1 hash:
30231a467a49cc37768eea0f55f4bea1cbfb48e2
Detections:
INDICATOR_SUSPICIOUS_EXE_RawPaste_URL
SH256 hash:
b8c9a273058d6214aeccc822fb5f304edc734bd57a4ac43450feeacef70fafb8
MD5 hash:
8576f95a0e018025e8b46367ae311e83
SHA1 hash:
0d1c5e913dcc60910e454416e3c149c9d05f02f5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:DotNet_Reactor
Author:@bartblaze
Description:Identifies .NET Reactor, which offers .NET code protection such as obfuscation, encryption and so on.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_EXE_Packed_DotNetReactor
Author:ditekSHen
Description:Detects executables packed with unregistered version of .NET Reactor
Rule name:INDICATOR_SUSPICIOUS_EXE_RawPaste_URL
Author:ditekSHen
Description:Detects executables (downlaoders) containing URLs to raw contents of a paste
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:PureCrypter
Author:@bartblaze
Description:Identifies PureCrypter, .NET loader and obfuscator.
Reference:https://malpedia.caad.fkie.fraunhofer.de/details/win.purecrypter
Rule name:RansomPyShield_Antiransomware
Author:XiAnzheng
Description:Check for Suspicious String and Import combination that Ransomware mostly abuse(can create FP)
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SelfExtractingRAR
Author:Xavier Mertens
Description:Detects an SFX archive with automatic script execution
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
SHELL_APIManipulates System Shellshell32.dll::ShellExecuteA
WIN32_PROCESS_APICan Create Process and Threadskernel32.dll::CloseHandle
WIN_BASE_IO_APICan Create Fileskernel32.dll::CreateFileA
kernel32.dll::GetWindowsDirectoryA
kernel32.dll::GetSystemDirectoryA
kernel32.dll::GetTempPathA

Comments