MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 d967ebc2cbd50a46ac5b686fe92faeb77fea5a148cbb69fba6a2d92eaa1abc53. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
DCRat
Vendor detections: 14
| SHA256 hash: | d967ebc2cbd50a46ac5b686fe92faeb77fea5a148cbb69fba6a2d92eaa1abc53 |
|---|---|
| SHA3-384 hash: | 623493557d9210d8ecb9914dae4f53fcabddf184688683557771850c4792ec621a4df0c44c642fdf50cc6012b965b55c |
| SHA1 hash: | 0d78828e7392660d3f9250417b654f1d5e6ad04b |
| MD5 hash: | 75077730d0b0cc562f277d943f68e20a |
| humanhash: | sierra-dakota-low-paris |
| File name: | 75077730D0B0CC562F277D943F68E20A.exe |
| Download: | download sample |
| Signature | DCRat |
| File size: | 4'257'792 bytes |
| First seen: | 2024-11-14 03:50:05 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 140094f13383e9ae168c4b35b6af3356 (32 x DCRat, 11 x CoinMiner, 10 x njrat) |
| ssdeep | 98304:S9LlIIN5pdgRiP7qBRbNarfV4sDUdX0lDJ:iLlID8ahaGiU6lD |
| TLSH | T1A516332FE8DB6D6DE8381B19AFC6A1B1A883E284037305F3459F2741A64547B5FCA0DD |
| TrID | 32.2% (.EXE) Win16 NE executable (generic) (5038/12/1) 28.8% (.EXE) Win32 Executable (generic) (4504/4/1) 13.0% (.EXE) OS/2 Executable (generic) (2029/13) 12.8% (.EXE) Generic Win/DOS Executable (2002/3) 12.8% (.EXE) DOS Executable Generic (2000/1) |
| Magika | pebin |
| Reporter | |
| Tags: | DCRat exe |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://072486cm.n9shteam.ru/PhppollbigloadservermultiSqlBasetrackCdnUploads.php | https://threatfox.abuse.ch/ioc/1344733/ |
Intelligence
File Origin
# of uploads :
1
# of downloads :
490
Origin country :
NLVendor Threat Intelligence
Malware family:
dcrat
ID:
1
File name:
Bootstrapper.exe
Verdict:
Malicious activity
Analysis date:
2024-11-09 03:09:45 UTC
Tags:
qrcode dcrat rat netreactor wmi-base64
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
autorun gumen
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Creating a file
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file in the %temp% directory
Running batch commands
Launching a process
Creating a window
Searching for synchronization primitives
Creating a process with a hidden window
Loading a suspicious library
Using the Windows Management Instrumentation requests
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun by creating a file
Enabling autorun
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
fasm packed peunion
Verdict:
Malicious
Labled as:
ExNuma.Generic
Verdict:
Malicious
Result
Threat name:
DCRat, PureLog Stealer, zgRAT
Detection:
malicious
Classification:
spre.troj.expl.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates an undocumented autostart registry key
Creates autostart registry keys with suspicious values (likely registry only malware)
Creates multiple autostart registry keys
Creates processes via WMI
Found malware configuration
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Schedule system process
Suricata IDS alerts for network traffic
Uses ipconfig to lookup or modify the Windows network settings
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Yara detected DCRat
Yara detected Powershell download and execute
Yara detected PureLog Stealer
Yara detected zgRAT
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Threat name:
Win32.Trojan.ExNuma
Status:
Malicious
First seen:
2024-11-07 17:34:47 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
21 of 24 (87.50%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
8/10
Tags:
discovery
Behaviour
Gathers network information
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Blocklisted process makes network request
Enumerates connected drives
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Unexpected DNS network traffic destination
Downloads MZ/PE file
Verdict:
Malicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
5153b60b002a0b82848661b6dc00df9e184ef2a3f800aac3e90f2f868b403c46
MD5 hash:
f99323ccbdf71989e975c21ef85ebe10
SHA1 hash:
bd71d9c530579b5944bfdd1a6a3b1b4f52f4eab3
SH256 hash:
2ed865a2e6310507dd10b185b5fb5c22300c99a8b33b8b8fddafc07cb8d86ebf
MD5 hash:
be4e61eec8a6cab29c1aeddd29d869ec
SHA1 hash:
ab621a907b95050b681dad9d5b9546bdc1452725
Detections:
INDICATOR_EXE_Packed_DotNetReactor
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
ebbcb489171abfcfce56554dbaeacd22a15838391cbc7c756db02995129def5a
MD5 hash:
2a4dcf20b82896be94eb538260c5fb93
SHA1 hash:
21f232c2fd8132f8677e53258562ad98b455e679
Detections:
INDICATOR_SUSPICIOUS_EXE_RawPaste_URL
SH256 hash:
d967ebc2cbd50a46ac5b686fe92faeb77fea5a148cbb69fba6a2d92eaa1abc53
MD5 hash:
75077730d0b0cc562f277d943f68e20a
SHA1 hash:
0d78828e7392660d3f9250417b654f1d5e6ad04b
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
DCRAT
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
No further information available
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| WIN32_PROCESS_API | Can Create Process and Threads | kernel32.dll::VirtualAllocExNuma kernel32.dll::CreateThread |
| WIN_BASE_USER_API | Retrieves Account Information | kernel32.dll::GetComputerNameA |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.