MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e6a1d03a6b1e0eb892b7b30d7df4071089feb7583d27668498156e773c458856. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DCRat


Vendor detections: 8


Intelligence 8 IOCs 1 YARA 4 File information Comments

SHA256 hash: e6a1d03a6b1e0eb892b7b30d7df4071089feb7583d27668498156e773c458856
SHA3-384 hash: 8715423096bbcfdf9f9665fba37ba4f394231f9816c629804897be6defef86f598b288d136b1adae76251476b75d4e0e
SHA1 hash: 2f0fb0e58e4a240f29eb6c5c9cce509c61c9a309
MD5 hash: c91b9fb01ca1a1782c13c372f6a9d11e
humanhash: jupiter-angel-hydrogen-diet
File name:C91B9FB01CA1A1782C13C372F6A9D11E.exe
Download: download sample
Signature DCRat
File size:2'203'690 bytes
First seen:2021-07-05 05:50:35 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 49152:NbA3Nc+MFr0qFZjN+K6CYGRjen2SmPaupt:NbwMFrrRN+K6bIi2Sju/
TLSH 36A52311BD858772C695F9F51528AA60E83DFD200FF8CA8BF3D4B93C99353A0A25C167
Reporter abuse_ch
Tags:DCRat exe


Avatar
abuse_ch
DCRat C2:
http://79.174.13.146/LinuxFlower.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://79.174.13.146/LinuxFlower.php https://threatfox.abuse.ch/ioc/157520/

Intelligence


File Origin
# of uploads :
1
# of downloads :
146
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
C91B9FB01CA1A1782C13C372F6A9D11E.exe
Verdict:
Suspicious activity
Analysis date:
2021-07-05 05:52:26 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Binary is likely a compiled AutoIt script file
Connects to a pastebin service (likely for C&C)
Contains functionality to inject code into remote processes
Creates files inside the volume driver (system volume information)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Sigma detected: Schedule system process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected DCRat
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 444107 Sample: C1jT7pIYSJ.exe Startdate: 05/07/2021 Architecture: WINDOWS Score: 100 84 Found malware configuration 2->84 86 Multi AV Scanner detection for dropped file 2->86 88 Multi AV Scanner detection for submitted file 2->88 90 9 other signatures 2->90 10 C1jT7pIYSJ.exe 7 2->10         started        13 ReviewdriverintoDhcpsvcReviewrefbroker.exe 2->13         started        16 cAugHmSRsr.exe 2->16         started        18 2 other processes 2->18 process3 file4 66 C:\Users\user\AppData\Roaming\zxzx.exe, PE32 10->66 dropped 20 zxzx.exe 3 10->20         started        102 Multi AV Scanner detection for dropped file 13->102 104 Machine Learning detection for dropped file 13->104 106 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 13->106 68 C:\Users\user\...behaviorgraphH Injector - x64.exe.log, ASCII 18->68 dropped signatures5 process6 file7 60 C:\Users\...\khIKNfxAvcWUgXTyuzplmOtj.exe, PE32 20->60 dropped 92 Antivirus detection for dropped file 20->92 94 Multi AV Scanner detection for dropped file 20->94 96 Machine Learning detection for dropped file 20->96 24 khIKNfxAvcWUgXTyuzplmOtj.exe 8 20->24         started        signatures8 process9 file10 62 ReviewdriverintoDh...Reviewrefbroker.exe, PE32 24->62 dropped 64 C:\Users\user\AppData\RoamingbehaviorgraphHI.exe, PE32 24->64 dropped 98 Multi AV Scanner detection for dropped file 24->98 100 Machine Learning detection for dropped file 24->100 28 ReviewdriverintoDhcpsvcReviewrefbroker.exe 1 22 24->28         started        32 GHI.exe 6 24->32         started        signatures11 process12 file13 70 C:\Windows\System32\...\MusNotifyIcon.exe, PE32 28->70 dropped 72 C:\Windows\System32\dimsjob\taskhostw.exe, PE32 28->72 dropped 74 C:\Windows\System32\...\RuntimeBroker.exe, PE32 28->74 dropped 80 4 other malicious files 28->80 dropped 108 Multi AV Scanner detection for dropped file 28->108 110 Creates files inside the volume driver (system volume information) 28->110 112 Machine Learning detection for dropped file 28->112 114 3 other signatures 28->114 34 schtasks.exe 28->34         started        36 schtasks.exe 28->36         started        38 schtasks.exe 28->38         started        45 5 other processes 28->45 76 C:\tempbehaviorgraphH Injector - x64.exe, PE32+ 32->76 dropped 78 C:\tempbehaviorgraphH Injector - x64.dll, PE32+ 32->78 dropped 40 GH Injector - x64.exe 16 32->40         started        43 conhost.exe 32->43         started        signatures14 process15 dnsIp16 47 conhost.exe 34->47         started        50 conhost.exe 36->50         started        52 conhost.exe 38->52         started        82 pastebin.com 104.23.98.190, 443, 49722, 49723 CLOUDFLARENETUS United States 40->82 54 conhost.exe 45->54         started        56 conhost.exe 45->56         started        58 conhost.exe 45->58         started        process17 signatures18 116 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 47->116
Threat name:
Win32.Backdoor.LightStone
Status:
Malicious
First seen:
2021-07-02 05:48:31 UTC
AV detection:
13 of 28 (46.43%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:dcrat evasion infostealer rat spyware stealer trojan upx
Behaviour
Creates scheduled task(s)
Modifies registry class
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in System32 directory
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
Reads user/profile data of web browsers
Windows security modification
Executes dropped EXE
UPX packed file
DCRat Payload
Contains code to disable Windows Defender
DcRat
Modifies Windows Defender Real-time Protection settings
Unpacked files
SH256 hash:
6620c8dd97c92c84f718690a6a94887704ec151730b4ab9afaba56e4b04f041c
MD5 hash:
348354c2e8e5da972db0f1d4836e249e
SHA1 hash:
4d376dcb0ceb68a55e0d47f4165a4b013d0c1601
SH256 hash:
043933cf2d619c6da0e932c3e7a302f210f3ae09d924379f8ae257c9c291e292
MD5 hash:
26546808d37e8159ab8ad2cb5ab3e37d
SHA1 hash:
41e677513e9fdf99a7cd8cdb30a9485dd81bb422
SH256 hash:
e6a1d03a6b1e0eb892b7b30d7df4071089feb7583d27668498156e773c458856
MD5 hash:
c91b9fb01ca1a1782c13c372f6a9d11e
SHA1 hash:
2f0fb0e58e4a240f29eb6c5c9cce509c61c9a309
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE).
Rule name:Glasses
Author:Seth Hardy
Description:Glasses family
Rule name:GlassesCode
Author:Seth Hardy
Description:Glasses code features
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments