MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c1a9b4928efb23673306553543b9f6efbfdb3dfa801c734a31a90a550cb2e3dc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DarkVisionRAT


Vendor detections: 13


Intelligence 13 IOCs YARA 3 File information Comments

SHA256 hash: c1a9b4928efb23673306553543b9f6efbfdb3dfa801c734a31a90a550cb2e3dc
SHA3-384 hash: 1ce8303fc04338f5212406cd32ac6037cf44d6bf4cba69942dc0da836036e394ccf51f4b72f0b653d6fe25584d8d4cd8
SHA1 hash: 022396ffbb199bc3fe50f0f8e95841fef8c42f98
MD5 hash: 579bbf5417ebb0916b6f6ea9ebea3244
humanhash: magazine-queen-apart-fish
File name:PO 8755.bat
Download: download sample
Signature DarkVisionRAT
File size:1'986'296 bytes
First seen:2025-12-18 08:29:21 UTC
Last seen:2025-12-18 10:23:41 UTC
File type:Batch (bat) bat
MIME type:text/plain
ssdeep 6144:3i6hhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhJ:3i+
Threatray 1'950 similar samples on MalwareBazaar
TLSH T1A0955B11D5FB463235D6287C09DF9632B45AF7980EA47B60B44119EF079EB073EEAB20
Magika batch
Reporter lowmal3
Tags:bat DarkVisionRAT

Intelligence


File Origin
# of uploads :
2
# of downloads :
70
Origin country :
DE DE
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
PO 8755.bat
Verdict:
No threats detected
Analysis date:
2025-12-18 08:32:36 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Running batch commands
Launching cmd.exe command interpreter
Forced system process termination
Launching a process
Сreating synchronization primitives
DNS request
Connection attempt
Sending a custom TCP request
Creating a file
Sending an HTTP GET request
Creating a process with a hidden window
Enabling autorun by creating a file
Unauthorized injection to a system process
Adding an exclusion to Microsoft Defender
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
cmd lolbin
Verdict:
Suspicious
Labled as:
TrojanDownloader/BAT.Netloader
Verdict:
Malicious
File Type:
unix shell
First seen:
2025-12-18T02:38:00Z UTC
Last seen:
2025-12-20T05:41:00Z UTC
Hits:
~100
Detections:
Backdoor.MSIL.XWorm.b Backdoor.MSIL.XWorm.a Trojan-Downloader.MSIL.Seraph.d Trojan-Downloader.MSIL.Agent.c Trojan.MSIL.Miner.sb Trojan.MSIL.Crypt.sb Trojan.Agentb.TCP.C&C PDM:Trojan.Win32.GenAutorunSchedulerTaskRun.c HEUR:Trojan.Multi.Powedon.a HEUR:Trojan.BAT.Agent.gen Trojan.MSIL.DOTHETUK.sb Trojan.BAT.Agent.sb PDM:Trojan.Win32.Generic
Result
Threat name:
DarkCloud, DarkVision Rat, XWorm
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Creates multiple autostart registry keys
Found large BAT file
Found malware configuration
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: PowerShell Base64 Encoded Invoke Keyword
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Invoke-WebRequest Execution
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Unusual module load detection (module proxying)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected DarkCloud
Yara detected DarkVision Rat
Yara detected Powershell decode and execute
Yara detected Telegram RAT
Yara detected UAC Bypass using CMSTP
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1835475 Sample: PO 8755.bat Startdate: 18/12/2025 Architecture: WINDOWS Score: 100 109 somethingood.viewdns.net 2->109 111 ia801709.us.archive.org 2->111 113 5 other IPs or domains 2->113 135 Suricata IDS alerts for network traffic 2->135 137 Found malware configuration 2->137 139 Malicious sample detected (through community Yara rule) 2->139 141 20 other signatures 2->141 12 cmd.exe 1 2->12         started        15 refronted.exe 2->15         started        17 refronted.exe 2->17         started        19 10 other processes 2->19 signatures3 process4 signatures5 163 Suspicious powershell command line found 12->163 165 Bypasses PowerShell execution policy 12->165 167 Adds a directory exclusion to Windows Defender 12->167 21 powershell.exe 14 16 12->21         started        26 cmd.exe 1 12->26         started        28 conhost.exe 12->28         started        169 Antivirus detection for dropped file 15->169 171 Multi AV Scanner detection for dropped file 15->171 173 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 15->173 175 Tries to steal Mail credentials (via file / registry access) 17->175 177 Tries to harvest and steal browser information (history, passwords, etc) 17->177 30 cmd.exe 19->30         started        32 conhost.exe 19->32         started        34 conhost.exe 19->34         started        36 8 other processes 19->36 process6 dnsIp7 115 ia801709.us.archive.org 207.241.233.39, 443, 49687 INTERNET-ARCHIVEUS United States 21->115 117 somethingood.viewdns.net 148.251.11.209, 3242, 49690, 49694 HETZNER-ASDE Germany 21->117 99 C:\Users\Public\Downloads\zHrSW1PIjq, JPEG 21->99 dropped 143 Writes to foreign memory regions 21->143 145 Injects a PE file into a foreign processes 21->145 38 MSBuild.exe 3 9 21->38         started        42 conhost.exe 21->42         started        44 cmd.exe 1 26->44         started        46 microsofts.exe 30->46         started        file8 signatures9 process10 file11 101 C:\Users\user\AppData\...\XWormClient.exe, PE32 38->101 dropped 103 C:\Users\user\AppData\Local\Temp\gmkkmb.EXE, PE32+ 38->103 dropped 105 C:\Users\user\AppData\Local\Temp\edpkhf.exe, PE32 38->105 dropped 107 C:\Users\user\AppData\...\Protect544cd51a.dll, PE32 38->107 dropped 147 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 38->147 149 Creates multiple autostart registry keys 38->149 151 Uses schtasks.exe or at.exe to add and modify task schedules 38->151 153 Adds a directory exclusion to Windows Defender 38->153 48 gmkkmb.EXE 38->48         started        52 edpkhf.exe 38->52         started        54 cmd.exe 38->54         started        56 5 other processes 38->56 signatures12 process13 file14 95 C:\ProgramData\microsofts\microsofts.exe, PE32+ 48->95 dropped 119 Multi AV Scanner detection for dropped file 48->119 121 Adds a directory exclusion to Windows Defender 48->121 58 microsofts.exe 48->58         started        61 cmd.exe 48->61         started        97 C:\Users\user\AppData\...\refronted.exe, PE32 52->97 dropped 123 Antivirus detection for dropped file 52->123 125 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 52->125 127 Tries to steal Mail credentials (via file / registry access) 52->127 129 Creates multiple autostart registry keys 52->129 131 Suspicious powershell command line found 54->131 63 cmd.exe 54->63         started        65 powershell.exe 54->65         started        67 conhost.exe 54->67         started        133 Loading BitLocker PowerShell Module 56->133 69 conhost.exe 56->69         started        71 conhost.exe 56->71         started        73 conhost.exe 56->73         started        75 2 other processes 56->75 signatures15 process16 signatures17 155 Multi AV Scanner detection for dropped file 58->155 157 Adds a directory exclusion to Windows Defender 58->157 159 Maps a DLL or memory area into another process 58->159 77 cmd.exe 58->77         started        80 explorer.exe 58->80         started        82 powershell.exe 61->82         started        84 conhost.exe 61->84         started        86 cmd.exe 63->86         started        88 conhost.exe 65->88         started        process18 signatures19 179 Adds a directory exclusion to Windows Defender 77->179 90 powershell.exe 77->90         started        93 conhost.exe 77->93         started        181 System process connects to network (likely due to code injection or exploit) 80->181 183 Unusual module load detection (module proxying) 80->183 185 Loading BitLocker PowerShell Module 82->185 process20 signatures21 161 Loading BitLocker PowerShell Module 90->161
Threat name:
Script-BAT.Backdoor.Remcos
Status:
Malicious
First seen:
2025-12-18 08:30:25 UTC
File Type:
Text (Batch)
AV detection:
7 of 24 (29.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Malware Config
Dropper Extraction:
https://ia801709.us.archive.org/8/items/optimized_msi_20251216_1724/optimized_MSI.png
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Base64_Encoded_Powershell_Directives
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:RANSOMWARE
Author:ToroGuitar

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

DarkVisionRAT

Batch (bat) bat c1a9b4928efb23673306553543b9f6efbfdb3dfa801c734a31a90a550cb2e3dc

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments