MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c955f8ad1fc411f7cbfce62ff7b8c6fa72f94f8f17eeff6fbecdb2f13e0b4c89. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DarkVisionRAT


Vendor detections: 16


Intelligence 16 IOCs YARA 7 File information Comments

SHA256 hash: c955f8ad1fc411f7cbfce62ff7b8c6fa72f94f8f17eeff6fbecdb2f13e0b4c89
SHA3-384 hash: 11c07926dec7cad49c220eb3d27e60aeb76113c85e6d9a395525a3152143953e2203e017cb6c52f46b7526fb8addcc4a
SHA1 hash: f5106aaf1ad14448455cecdc095268de8658f532
MD5 hash: bfb9728556cd59d321e7af93d9d83f7d
humanhash: white-mississippi-carpet-saturn
File name:QUOTATION 3034.exe
Download: download sample
Signature DarkVisionRAT
File size:453'120 bytes
First seen:2025-07-31 16:25:11 UTC
Last seen:2025-08-12 15:03:57 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash acd61b4f7cfd85185e5b79668f89c899 (4 x DarkVisionRAT)
ssdeep 6144:PYvIo4Jtmc7p5GYa2YS9c/LWq8ZAmT153a2fS/sflYuz:lmc7HZIWq8+Xi
Threatray 65 similar samples on MalwareBazaar
TLSH T181A4F847EB7551E4C87AC0788AA26323B9717C5C53346BDB9B508E531F22BE0E93EB05
TrID 44.4% (.EXE) Win64 Executable (generic) (10522/11/4)
21.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
8.7% (.ICL) Windows Icons Library (generic) (2059/9)
8.5% (.EXE) OS/2 Executable (generic) (2029/13)
8.4% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter James_inthe_box
Tags:DarkVisionRAT exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
30
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
yVX4rR-EEffL-OYv97jG_nL5T48X7v9vvs2y8T4LTIk.bin.exe
Verdict:
Malicious activity
Analysis date:
2025-07-31 15:39:22 UTC
Tags:
auto-startup darkvision rat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
autorun dropper virus shell
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Searching for synchronization primitives
Creating a file
Creating a process from a recently created file
Launching a process
DNS request
Connection attempt
Sending a custom TCP request
Adding an exclusion to Microsoft Defender
Unauthorized injection to a system process
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm cmd evasive expand exploit explorer lolbin microsoft_visual_cc
Malware family:
DarkVision RAT
Verdict:
Malicious
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) Win 64 Exe x64
Threat name:
Win64.Backdoor.Androm
Status:
Malicious
First seen:
2025-07-31 11:21:50 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
25 of 36 (69.44%)
Threat level:
  5/5
Result
Malware family:
darkvision
Score:
  10/10
Tags:
family:darkvision execution rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops startup file
Executes dropped EXE
Command and Scripting Interpreter: PowerShell
DarkVision Rat
Darkvision family
Malware Config
C2 Extraction:
educare1.ddns.net
Verdict:
Malicious
Tags:
Win.Malware.Lazy-10021166-0
YARA:
n/a
Unpacked files
SH256 hash:
c955f8ad1fc411f7cbfce62ff7b8c6fa72f94f8f17eeff6fbecdb2f13e0b4c89
MD5 hash:
bfb9728556cd59d321e7af93d9d83f7d
SHA1 hash:
f5106aaf1ad14448455cecdc095268de8658f532
Malware family:
Darkvision RAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:darkVision
Author:Michelle Khalil
Description:This rule detects unpacked darkVision malware samples.
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:ICMLuaUtil_UACMe_M41
Author:Marius 'f0wL' Genheimer <hello@dissectingmalwa.re>
Description:A Yara rule for UACMe Method 41 -> ICMLuaUtil Elevated COM interface
Reference:https://github.com/hfiref0x/UACME
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM
Author:ditekSHen
Description:Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessW
KERNEL32.dll::CloseHandle
WINHTTP.dll::WinHttpCloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetCommandLineA
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileW
KERNEL32.dll::GetWindowsDirectoryW
KERNEL32.dll::GetSystemDirectoryW
WIN_HTTP_APIUses HTTP servicesWINHTTP.dll::WinHttpAddRequestHeaders
WINHTTP.dll::WinHttpCheckPlatform
WINHTTP.dll::WinHttpConnect
WINHTTP.dll::WinHttpCrackUrl
WINHTTP.dll::WinHttpOpenRequest
WINHTTP.dll::WinHttpOpen
WIN_USER_APIPerforms GUI ActionsUSER32.dll::CreateWindowExW

Comments