MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e68a8a2f89159710896291473b1f51b16968d9066bb621a43a858ef4e0c7291a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DCRat


Vendor detections: 17


Intelligence 17 IOCs YARA 2 File information Comments

SHA256 hash: e68a8a2f89159710896291473b1f51b16968d9066bb621a43a858ef4e0c7291a
SHA3-384 hash: 06ce42337cc5eafcb29c584d1c6abb2258374dacaafc53d302eaf4b35a71b032ec70bc21d1310529b451459914295456
SHA1 hash: ea2e7cf1f27e33dfaa5866653da398b3efaadea3
MD5 hash: 7862b63c418789257f399d079d011549
humanhash: spring-wolfram-massachusetts-speaker
File name:7862b63c418789257f399d079d011549.exe
Download: download sample
Signature DCRat
File size:559'104 bytes
First seen:2023-02-26 06:20:38 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 12288:TMrJy90NBJ2f3wL+Da+8lKQ/4grkA2fqr+XmVX2FQ:eyWBJ23wLyajlzPrCCr+Xq
Threatray 4'063 similar samples on MalwareBazaar
TLSH T145C4020BE7E88022F4F567745DF303C31635BD515A3882AB2B8FAD5D18726B4A63136B
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:DCRat exe


Avatar
abuse_ch
DCRat C2:
http://haivo.co.zw/admin/Linerequestgeosql.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
198
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
7862b63c418789257f399d079d011549.exe
Verdict:
Malicious activity
Analysis date:
2023-02-26 06:21:41 UTC
Tags:
trojan amadey rat redline loader backdoor dcrat stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Сreating synchronization primitives
Launching a process
Launching cmd.exe command interpreter
Adding an access-denied ACE
Creating a window
Running batch commands
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Sending an HTTP GET request to an infection source
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
advpack.dll amadey CAB comodo greyware installer packed redline rundll32.exe setupapi.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, DCRat, RedLine, Xmrig
Detection:
malicious
Classification:
phis.troj.spyw.evad.mine
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Creates processes via WMI
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops executable to a common third party application directory
Drops PE files to the user root directory
Drops PE files with benign system names
Found many strings related to Crypto-Wallets (likely being stolen)
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadey bot
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected DCRat
Yara detected RedLine Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 815340 Sample: GSpNG3g7y2.exe Startdate: 26/02/2023 Architecture: WINDOWS Score: 100 166 xiaoxiaojue.duckdns.org 2->166 192 Snort IDS alert for network traffic 2->192 194 Malicious sample detected (through community Yara rule) 2->194 196 Antivirus detection for URL or domain 2->196 198 15 other signatures 2->198 14 GSpNG3g7y2.exe 1 4 2->14         started        17 lampa.exe 2->17         started        19 lampa.exe 2->19         started        21 9 other processes 2->21 signatures3 process4 file5 140 C:\Users\user\AppData\Local\...\tYm20Pa.exe, PE32 14->140 dropped 142 C:\Users\user\AppData\Local\...\ckk80.exe, PE32 14->142 dropped 23 ckk80.exe 3 14->23         started        27 tYm20Pa.exe 2 14->27         started        144 C:\Users\user\AppData\Local\...\nZX44ba55.exe, PE32 17->144 dropped 146 C:\Users\user\AppData\Local\...\eFm17oN72.exe, PE32 17->146 dropped 30 eFm17oN72.exe 17->30         started        148 C:\Users\user\AppData\Local\...\nZX44ba55.exe, PE32 19->148 dropped 150 C:\Users\user\AppData\Local\...\eFm17oN72.exe, PE32 19->150 dropped process6 dnsIp7 132 C:\Users\user\AppData\Local\...\mnolyk.exe, PE32 23->132 dropped 220 Multi AV Scanner detection for dropped file 23->220 222 Contains functionality to inject code into remote processes 23->222 32 mnolyk.exe 1 25 23->32         started        37 conhost.exe 23->37         started        174 193.233.20.12, 4132 REDCOM-ASRedcomKhabarovskRussiaRU Russian Federation 27->174 224 Detected unpacking (changes PE section rights) 30->224 226 Detected unpacking (overwrites its own PE header) 30->226 228 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 30->228 230 3 other signatures 30->230 file8 signatures9 process10 dnsIp11 152 62.204.41.5, 49695, 49696, 49698 TNNET-ASTNNetOyMainnetworkFI United Kingdom 32->152 154 62.204.41.245, 49699, 80 TNNET-ASTNNetOyMainnetworkFI United Kingdom 32->154 156 2 other IPs or domains 32->156 110 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 32->110 dropped 112 C:\Users\user\AppData\Local\...\lebro.exe, PE32 32->112 dropped 114 C:\Users\user\AppData\Local\...\lampa.exe, PE32 32->114 dropped 116 3 other malicious files 32->116 dropped 184 Multi AV Scanner detection for dropped file 32->184 186 Creates an undocumented autostart registry key 32->186 188 Creates multiple autostart registry keys 32->188 190 Uses schtasks.exe or at.exe to add and modify task schedules 32->190 39 lebro.exe 32->39         started        43 lampa.exe 1 4 32->43         started        45 cmd.exe 1 32->45         started        47 2 other processes 32->47 file12 signatures13 process14 file15 134 C:\Users\user\AppData\Local\...\nbveek.exe, PE32 39->134 dropped 232 Multi AV Scanner detection for dropped file 39->232 234 Machine Learning detection for dropped file 39->234 49 nbveek.exe 39->49         started        136 C:\Users\user\AppData\Local\...\nZX44ba55.exe, PE32 43->136 dropped 138 C:\Users\user\AppData\Local\...\eFm17oN72.exe, PE32 43->138 dropped 236 Antivirus detection for dropped file 43->236 54 eFm17oN72.exe 43->54         started        56 cacls.exe 1 45->56         started        58 conhost.exe 45->58         started        60 cmd.exe 1 45->60         started        64 4 other processes 45->64 62 conhost.exe 47->62         started        signatures16 process17 dnsIp18 158 62.204.41.88, 49709, 49710, 49712 TNNET-ASTNNetOyMainnetworkFI United Kingdom 49->158 160 45.15.159.15, 49711, 80 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 49->160 164 2 other IPs or domains 49->164 118 C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+ 49->118 dropped 120 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 49->120 dropped 122 C:\Users\user\AppData\Local\Temp\...\rc.exe, PE32 49->122 dropped 124 5 other malicious files 49->124 dropped 200 Multi AV Scanner detection for dropped file 49->200 66 rc.exe 49->66         started        69 Hedtgoupb.exe 49->69         started        73 rundll32.exe 49->73         started        75 3 other processes 49->75 162 193.233.20.23, 4124, 49863, 49922 REDCOM-ASRedcomKhabarovskRussiaRU Russian Federation 54->162 202 Detected unpacking (changes PE section rights) 54->202 204 Detected unpacking (overwrites its own PE header) 54->204 206 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 54->206 208 Tries to steal Crypto Currency Wallets 54->208 210 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 56->210 file19 signatures20 process21 dnsIp22 126 C:\Hyperfontdll\msdriver.exe, PE32 66->126 dropped 128 C:\Hyperfontdll\AnbVBqAXw9.vbe, data 66->128 dropped 77 wscript.exe 66->77         started        168 transfer.sh 144.76.136.153, 443, 50376, 50443 HETZNER-ASDE Germany 69->168 170 xiaoxiaojue.duckdns.org 212.87.204.245, 50338, 50372, 50379 GEMENIIGEMENIINETWORKRO Germany 69->170 172 192.168.2.1 unknown unknown 69->172 130 C:\Users\user\AppData\Roaming\Hedtgoupb.exe, PE32+ 69->130 dropped 212 Multi AV Scanner detection for dropped file 69->212 214 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 69->214 216 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 69->216 218 4 other signatures 69->218 79 rundll32.exe 73->79         started        82 conhost.exe 75->82         started        84 conhost.exe 75->84         started        86 cmd.exe 75->86         started        88 5 other processes 75->88 file23 signatures24 process25 signatures26 90 cmd.exe 77->90         started        238 System process connects to network (likely due to code injection or exploit) 79->238 240 Tries to steal Instant Messenger accounts or passwords 79->240 242 Tries to harvest and steal ftp login credentials 79->242 244 Tries to harvest and steal browser information (history, passwords, etc) 79->244 92 tar.exe 79->92         started        94 svchost.exe 79->94         started        process27 process28 96 msdriver.exe 90->96         started        100 conhost.exe 90->100         started        file29 102 C:\Windows\...\QRJmnztDljRwAalVQB.exe, PE32 96->102 dropped 104 C:\Users\Default\mnolyk.exe, PE32 96->104 dropped 106 C:\Users\Default\AppData\...\lampa.exe, PE32 96->106 dropped 108 16 other malicious files 96->108 dropped 176 Antivirus detection for dropped file 96->176 178 Multi AV Scanner detection for dropped file 96->178 180 Machine Learning detection for dropped file 96->180 182 4 other signatures 96->182 signatures30
Threat name:
Win32.Spyware.RedLine
Status:
Malicious
First seen:
2023-02-11 09:18:13 UTC
File Type:
PE (Exe)
Extracted files:
138
AV detection:
20 of 25 (80.00%)
Threat level:
  2/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:amadey family:dcrat family:redline botnet:frukt botnet:rodik botnet:romik discovery infostealer persistence rat spyware stealer trojan
Behaviour
Creates scheduled task(s)
Modifies registry class
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
DCRat payload
Amadey
DcRat
Process spawned unexpected child process
RedLine
RedLine payload
Malware Config
C2 Extraction:
62.204.41.5/Bu58Ngs/index.php
62.204.41.88/9vdVVVjsw/index.php
193.233.20.12:4132
193.233.20.23:4124
Unpacked files
SH256 hash:
75f41983d7da68c378b64f8e5633bde393f9c550469ae5bd4da6d64d6674286b
MD5 hash:
285e4cae921c512fec71492eaafc27c4
SHA1 hash:
7a1022b0ec66c57a216bd0f842906917e7851130
SH256 hash:
026fe26cda6bcfb93533c3cc75e564431f13d2e32e4ee5d34c3bed13bb5035a5
MD5 hash:
6402b7f57f8fa04daae7fa312bcc6def
SHA1 hash:
7f49a72f083b594ef25511bbf2ac294372e9e6fc
SH256 hash:
c73864047adc9efa17de0467168fa22d50edd5d1bda347314183073098d34ce5
MD5 hash:
1d83ae4b0b827a40e48c554410260ce0
SHA1 hash:
5235dcd38551d92751ea29be3888f5146093352a
SH256 hash:
e68a8a2f89159710896291473b1f51b16968d9066bb621a43a858ef4e0c7291a
MD5 hash:
7862b63c418789257f399d079d011549
SHA1 hash:
ea2e7cf1f27e33dfaa5866653da398b3efaadea3
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments