MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e8fc5780d9cc4a19331190c876fbee0bc456a9f4b4b7610c6054474f18d2744f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DarkVisionRAT


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: e8fc5780d9cc4a19331190c876fbee0bc456a9f4b4b7610c6054474f18d2744f
SHA3-384 hash: 4f97d7bd9d67a1d66574c0bab56097b4beca7a70db1257b40c9b0e49d047a602dead6a9ab4a0e7ce2663e90fa4515a7c
SHA1 hash: f5242df0cd89d1e7e93809b3f57119f1f02fddcf
MD5 hash: 260068f3eb51470c3dd396b239441123
humanhash: maryland-batman-october-sodium
File name:SecuriteInfo.com.Win64.Evo-gen.28829498
Download: download sample
Signature DarkVisionRAT
File size:1'958'912 bytes
First seen:2025-11-20 04:52:37 UTC
Last seen:2025-11-20 06:28:17 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 679877ea45ff38e48e48875d525bcbb1 (15 x DarkVisionRAT)
ssdeep 49152:wudsKK64Eec20eCdWbivNY/Ml2chdQJs+krdUVeWqDGpRwIN:wuKu4EexCAGe0RnQGLrCV2nIN
TLSH T1429523415183617FC9B1C27BD19B77B8E8A03FBB8D914C4AE2493E146C379D29E2B60D
TrID 38.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
15.6% (.ICL) Windows Icons Library (generic) (2059/9)
15.4% (.EXE) OS/2 Executable (generic) (2029/13)
15.2% (.EXE) Generic Win/DOS Executable (2002/3)
15.2% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter SecuriteInfoCom
Tags:DarkVisionRAT exe

Intelligence


File Origin
# of uploads :
3
# of downloads :
116
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
BVLP267.exe
Verdict:
Malicious activity
Analysis date:
2025-11-20 04:12:33 UTC
Tags:
darkvision remote rat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
spawn virus hype
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Creating a process with a hidden window
Connection attempt
Sending a custom TCP request
Launching the default Windows debugger (dwwin.exe)
Сreating synchronization primitives
Searching for synchronization primitives
DNS request
Creating a file in the Windows subdirectories
Creating a service
Loading a system driver
Forced shutdown of a system process
Connection attempt to an infection source
Enabling autorun for a service
Unauthorized injection to a system process
Sending an HTTP GET request to an infection source
Adding an exclusion to Microsoft Defender
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
obfuscated packed packed unsafe vmprotect
Result
Gathering data
Verdict:
Malicious
File Type:
exe x64
First seen:
2025-11-20T01:23:00Z UTC
Last seen:
2025-11-20T01:37:00Z UTC
Hits:
~100
Detections:
Trojan.Win32.Strab.zos Trojan.Inject.TCP.ServerRequest Trojan.Agent.TCP.ServerRequest PDM:Trojan.Win32.Generic Trojan.Win32.Strab.sb Trojan.Win32.Agent.sb Trojan.MSIL.BypassUAC.sb
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 64 Exe x64
Result
Malware family:
darkvision
Score:
  10/10
Tags:
family:darkvision execution persistence rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: PowerShell
Sets service image path in registry
DarkVision Rat
Darkvision family
Suspicious use of NtCreateUserProcessOtherParentProcess
Malware Config
C2 Extraction:
23.95.245.178
Verdict:
Malicious
Tags:
DarkVision_RAT
YARA:
n/a
Unpacked files
SH256 hash:
e8fc5780d9cc4a19331190c876fbee0bc456a9f4b4b7610c6054474f18d2744f
MD5 hash:
260068f3eb51470c3dd396b239441123
SHA1 hash:
f5242df0cd89d1e7e93809b3f57119f1f02fddcf
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DarkVisionRAT

Executable exe e8fc5780d9cc4a19331190c876fbee0bc456a9f4b4b7610c6054474f18d2744f

(this sample)

  
Delivery method
Distributed via web download

Comments