MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f4cd9d90c5f772963664e07973d5374984dc92381cd5ad1752037df71aab6185. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DCRat


Vendor detections: 10


Intelligence 10 IOCs 1 YARA File information Comments

SHA256 hash: f4cd9d90c5f772963664e07973d5374984dc92381cd5ad1752037df71aab6185
SHA3-384 hash: 9ceea13ade8e997f682b2029395ca436594de4160ea3887ab02a111ff417b454f63d1263cb8a2b25821b894a8e6bd388
SHA1 hash: 59749946d894e70ac6bbf30026dc63f8e5137c73
MD5 hash: 957b7deb406f4b269585e243e9b341ee
humanhash: twelve-beer-maine-missouri
File name:73166810.exe
Download: download sample
Signature DCRat
File size:1'700'509 bytes
First seen:2022-03-23 04:59:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 24576:U2G/nvxW3Ww0th6CfIMH+0PGK92HnSOAY3jfx2twY7b5e5c4VsLjXi:UbA300C1H+0Fk5fx2tP7le5caF
Threatray 2'730 similar samples on MalwareBazaar
TLSH T14475AE027A54CE52D0A50733C4EFC51843BCAC432A66DB5B7A8A3B9D21913E35E6D6CF
File icon (PE):PE icon
dhash icon 9494b494d4aeaeac (832 x DCRat, 172 x RedLineStealer, 134 x CryptOne)
Reporter adm1n_usa32
Tags:DCRat exe

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://94.103.81.144/To4flower/longpollExternaldle3/Externalapi2External/3Voiddbbetter/externalprotectBigload/7Wordpress/7Multi8/4javascriptSql/8Local8/16/wordpress/flower/Geo/8image/python/87/videoPolltrafficLocal.php https://threatfox.abuse.ch/ioc/441538/

Intelligence


File Origin
# of uploads :
1
# of downloads :
185
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file
Creating a process from a recently created file
Running batch commands
Creating a process with a hidden window
Sending an HTTP GET request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Launching a process
Unauthorized injection to a recently created process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
greyware overlay packed packed replace.exe setupapi.dll shdocvw.dll shell32.dll update.exe
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to steal Crypto Currency Wallets
Yara detected DCRat
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-03-23 05:00:14 UTC
File Type:
PE (Exe)
Extracted files:
21
AV detection:
18 of 42 (42.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
spyware stealer suricata
Behaviour
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
suricata: ET MALWARE DCRAT Activity (GET)
Unpacked files
SH256 hash:
e631e418c6963907fd4941e122559cfd4328eba0fe93d08340658bae4ae5312e
MD5 hash:
afcf6fd7d1111a652c65f54905db07a7
SHA1 hash:
92cb739faa4735cdcdc769b13a899a81c337c983
SH256 hash:
909bef5ce235287e060fe4829a68525e96bd5314f3c272110cf13a4eb4ea63da
MD5 hash:
0d7cb7983ed42e1658a482df0aca6380
SHA1 hash:
6ec8a5ec5c9d8f8cb1e0ba861941a1f5c2e69198
SH256 hash:
f4cd9d90c5f772963664e07973d5374984dc92381cd5ad1752037df71aab6185
MD5 hash:
957b7deb406f4b269585e243e9b341ee
SHA1 hash:
59749946d894e70ac6bbf30026dc63f8e5137c73
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments