MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dec05061330cdd96419eb3cddade5f8198f6c30e17551842a0c644e1642ddea1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DCRat


Vendor detections: 8


Intelligence 8 IOCs 1 YARA 5 File information Comments

SHA256 hash: dec05061330cdd96419eb3cddade5f8198f6c30e17551842a0c644e1642ddea1
SHA3-384 hash: 0522b74fbbf3aea360c62a7f17af9ce5dbdd0bad974e35139eccb2de71292dd5c4f7ed319513a91b5da7d80dddcfef5d
SHA1 hash: 39970ddafe350981bffdbd63aa5ede69dee6d2ae
MD5 hash: 79512c583293a146a738ade39ec8c3c0
humanhash: hawaii-lithium-robin-william
File name:79512C583293A146A738ADE39EC8C3C0.exe
Download: download sample
Signature DCRat
File size:1'690'624 bytes
First seen:2021-07-08 23:01:22 UTC
Last seen:2021-07-08 23:38:45 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2e5467cba76f44a088d39f78c5e807b6 (131 x DCRat, 113 x njrat, 80 x RedLineStealer)
ssdeep 49152:LvBiXdKuQ+8nBlCX+LWZL2OEZLUDymeB6gRI:rBiXMuQFPCX+LMYUO7R
Threatray 32 similar samples on MalwareBazaar
TLSH T1207533FC5FD978CBE3540AB48F77855D107E2AE92D97232D0FA4CA2664D6058B2E0732
Reporter abuse_ch
Tags:DCRat exe


Avatar
abuse_ch
DCRat C2:
http://83.136.232.140/Javascript_protectbaseuniversal.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://83.136.232.140/Javascript_protectbaseuniversal.php https://threatfox.abuse.ch/ioc/158744/

Intelligence


File Origin
# of uploads :
2
# of downloads :
145
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Setup.rar
Verdict:
Malicious activity
Analysis date:
2021-07-07 07:08:22 UTC
Tags:
stealer trojan rat backdoor dcrat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Creates files inside the volume driver (system volume information)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with benign system names
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Sigma detected: Schedule system process
Tries to evade analysis by execution special instruction which cause usermode exception
Tries to harvest and steal browser information (history, passwords, etc)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected DCRat
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 446209 Sample: ZPo8tTWVK3.exe Startdate: 09/07/2021 Architecture: WINDOWS Score: 100 96 Found malware configuration 2->96 98 Multi AV Scanner detection for dropped file 2->98 100 Multi AV Scanner detection for submitted file 2->100 102 10 other signatures 2->102 9 ZPo8tTWVK3.exe 4 29 2->9         started        13 WmiPrvSE.exe 3 2->13         started        15 ShellExperienceHost.exe 2->15         started        17 5 other processes 2->17 process3 dnsIp4 68 C:\Windows\SysWOW64\wbem\WMIC\WmiPrvSE.exe, PE32 9->68 dropped 70 C:\Windows\SysWOW64\kbdnec\dwm.exe, PE32 9->70 dropped 72 C:\Users\user\AppData\...\services.exe, PE32 9->72 dropped 74 12 other malicious files 9->74 dropped 108 Detected unpacking (changes PE section rights) 9->108 110 Detected unpacking (overwrites its own PE header) 9->110 112 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 9->112 124 3 other signatures 9->124 20 cmd.exe 9->20         started        23 schtasks.exe 1 9->23         started        25 schtasks.exe 1 9->25         started        27 6 other processes 9->27 114 Multi AV Scanner detection for dropped file 13->114 116 Machine Learning detection for dropped file 13->116 118 Tries to evade analysis by execution special instruction which cause usermode exception 13->118 120 Hides threads from debuggers 15->120 84 83.136.232.140, 49731, 49740, 49741 MTR-SVIAZ-ASRU Russian Federation 17->84 86 192.168.2.1 unknown unknown 17->86 122 Tries to harvest and steal browser information (history, passwords, etc) 17->122 file5 signatures6 process7 signatures8 104 Uses ping.exe to sleep 20->104 106 Uses ping.exe to check the status of other devices and networks 20->106 29 ZPo8tTWVK3.exe 20->29         started        45 3 other processes 20->45 33 conhost.exe 23->33         started        35 conhost.exe 25->35         started        37 conhost.exe 25->37         started        39 conhost.exe 27->39         started        41 conhost.exe 27->41         started        43 conhost.exe 27->43         started        47 3 other processes 27->47 process9 file10 76 C:\Windows\...\ShellExperienceHost.exe, PE32 29->76 dropped 78 C:\Windows\SysWOW64\wbem\...\WmiPrvSE.exe, PE32 29->78 dropped 80 C:\...\WSitJScyyIgHuDgEgG.exe, PE32 29->80 dropped 82 7 other malicious files 29->82 dropped 126 Creates files inside the volume driver (system volume information) 29->126 128 Drops executables to the windows directory (C:\Windows) and starts them 29->128 130 Hides threads from debuggers 29->130 132 Hides that the sample has been downloaded from the Internet (zone.identifier) 29->132 49 WmiPrvSE.exe 29->49         started        52 schtasks.exe 29->52         started        54 schtasks.exe 29->54         started        58 4 other processes 29->58 134 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 33->134 56 conhost.exe 39->56         started        signatures11 process12 signatures13 88 Detected unpacking (changes PE section rights) 49->88 90 Detected unpacking (overwrites its own PE header) 49->90 92 Machine Learning detection for dropped file 49->92 94 3 other signatures 49->94 60 conhost.exe 52->60         started        62 conhost.exe 54->62         started        64 conhost.exe 58->64         started        66 conhost.exe 58->66         started        process14
Threat name:
ByteCode-MSIL.Trojan.SpyNoon
Status:
Malicious
First seen:
2021-07-05 17:28:03 UTC
AV detection:
31 of 46 (67.39%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
spyware stealer
Behaviour
Creates scheduled task(s)
Modifies registry class
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Unpacked files
SH256 hash:
13659b783d44995b4fa732bbc7373f432f1f4da46cbb6cc782c0415740f73218
MD5 hash:
50d5df7887c0ef37fbeea36fc8f58059
SHA1 hash:
01a0785f9e2c13650d3d1f8b841ed525a2bee94e
SH256 hash:
dec05061330cdd96419eb3cddade5f8198f6c30e17551842a0c644e1642ddea1
MD5 hash:
79512c583293a146a738ade39ec8c3c0
SHA1 hash:
39970ddafe350981bffdbd63aa5ede69dee6d2ae
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:EnigmaStub
Author:@bartblaze
Description:Identifies Enigma packer stub.
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_XORed_URL_in_EXE
Author:Florian Roth
Description:Detects an XORed URL in an executable
Reference:https://twitter.com/stvemillertime/status/1237035794973560834
Rule name:win_smominru_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.smominru.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments