MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fa28f9b07403390be50ffe3d1df25884a9e61c2edeafa194d0c37b4c51a720f3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DCRat


Vendor detections: 14


Intelligence 14 IOCs YARA 2 File information Comments

SHA256 hash: fa28f9b07403390be50ffe3d1df25884a9e61c2edeafa194d0c37b4c51a720f3
SHA3-384 hash: d9369b41e2608f41fd4d1a5165ad26a06314c668638222dab580d34cff1e3f313ffea47cd9f92f7e823dac49b219b970
SHA1 hash: 918a022a5f09e3c5e6ca737bd5dbc5514c9af7fe
MD5 hash: b8d3f021d5218d8fa6ce7bf90456358b
humanhash: thirteen-bravo-echo-alabama
File name:HEUR-Backdoor.MSIL.LightStone.gen-fa28f9b0740.exe
Download: download sample
Signature DCRat
File size:680'960 bytes
First seen:2023-01-05 15:45:38 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'608 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 12288:o0iZ6aAb0pksXsvst9xmk+fvy4M3IfiCdEwEaaVcTXD7Bc0SzLC/a:RiIRb0FX/mk+jFfi2Ejc3tXBa
Threatray 710 similar samples on MalwareBazaar
TLSH T1CAE45C49E7A57960F16BCA779AF86330F657E3EC18903FC3043698625AAD1404E6237F
TrID 58.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
13.2% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
8.4% (.EXE) Win64 Executable (generic) (10523/12/4)
5.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.0% (.EXE) Win16 NE executable (generic) (5038/12/1)
Reporter abuse_ch
Tags:DCRat exe


Avatar
abuse_ch
DCRat C2:
http://80.87.201.45/piperequestauth.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
196
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
HEUR-Backdoor.MSIL.LightStone.gen-fa28f9b0740.exe
Verdict:
Malicious activity
Analysis date:
2023-01-05 15:47:57 UTC
Tags:
trojan rat backdoor dcrat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Unauthorized injection to a recently created process
Creating a file
Using the Windows Management Instrumentation requests
Сreating synchronization primitives
Launching a process
Creating a file in the Windows subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Sending an HTTP GET request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun by creating a file
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
.NET source code references suspicious native API functions
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Drops executable to a common third party application directory
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files with benign system names
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
System process connects to network (likely due to code injection or exploit)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected DCRat
Yara detected Generic Downloader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 778495 Sample: HEUR-Backdoor.MSIL.LightSto... Startdate: 05/01/2023 Architecture: WINDOWS Score: 100 79 Multi AV Scanner detection for domain / URL 2->79 81 Malicious sample detected (through community Yara rule) 2->81 83 Antivirus detection for URL or domain 2->83 85 12 other signatures 2->85 9 HEUR-Backdoor.MSIL.LightStone.gen-fa28f9b0740.exe 1 2->9         started        13 explorer.exe 1 2->13         started        15 jgSDIzCxxLywAxUiZjIHybQTwX.exe 1 2->15         started        17 3 other processes 2->17 process3 file4 73 HEUR-Backdoor.MSIL...fa28f9b0740.exe.log, ASCII 9->73 dropped 97 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 9->97 99 Uses schtasks.exe or at.exe to add and modify task schedules 9->99 101 Drops PE files with benign system names 9->101 19 HEUR-Backdoor.MSIL.LightStone.gen-fa28f9b0740.exe 4 29 9->19         started        103 Antivirus detection for dropped file 13->103 105 Multi AV Scanner detection for dropped file 13->105 107 Machine Learning detection for dropped file 13->107 111 2 other signatures 13->111 23 explorer.exe 13->23         started        109 Injects a PE file into a foreign processes 15->109 25 jgSDIzCxxLywAxUiZjIHybQTwX.exe 15->25         started        27 fontdrvhost.exe 17->27         started        30 Registry.exe 17->30         started        32 HEUR-Backdoor.MSIL.LightStone.gen-fa28f9b0740.exe 17->32         started        signatures5 process6 dnsIp7 65 C:\Windows\mib\explorer.exe, PE32 19->65 dropped 67 C:\Windows\SysWOW64\...\fontdrvhost.exe, PE32 19->67 dropped 69 C:\Windows\SysWOW64\...\dwm.exe, PE32 19->69 dropped 71 11 other malicious files 19->71 dropped 91 Drops executable to a common third party application directory 19->91 93 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->93 34 cmd.exe 1 19->34         started        37 schtasks.exe 1 19->37         started        39 schtasks.exe 1 19->39         started        41 5 other processes 19->41 95 System process connects to network (likely due to code injection or exploit) 23->95 75 80.87.201.45, 49695, 49696, 49697 THEFIRST-ASRU Russian Federation 27->75 file8 signatures9 process10 signatures11 87 Uses ping.exe to sleep 34->87 89 Uses ping.exe to check the status of other devices and networks 34->89 43 HEUR-Backdoor.MSIL.LightStone.gen-fa28f9b0740.exe 34->43         started        46 PING.EXE 34->46         started        59 2 other processes 34->59 49 conhost.exe 37->49         started        51 conhost.exe 39->51         started        53 conhost.exe 41->53         started        55 conhost.exe 41->55         started        57 conhost.exe 41->57         started        61 2 other processes 41->61 process12 dnsIp13 113 Injects a PE file into a foreign processes 43->113 63 HEUR-Backdoor.MSIL.LightStone.gen-fa28f9b0740.exe 43->63         started        77 192.168.2.1 unknown unknown 46->77 115 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 49->115 signatures14 process15
Threat name:
ByteCode-MSIL.Backdoor.LightStone
Status:
Malicious
First seen:
2021-07-16 03:22:25 UTC
File Type:
PE (.Net Exe)
Extracted files:
2
AV detection:
19 of 25 (76.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:dcrat infostealer rat
Behaviour
Creates scheduled task(s)
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
DCRat payload
DcRat
Unpacked files
SH256 hash:
293ac7e4f40f1d72d519bbeb28eaacaeebec2c38e60dcb7e257955e7f7f1ef96
MD5 hash:
e85df3b5ae6b64d4ef4ff96fb19c5c06
SHA1 hash:
c15f7c6c3317ebb22b64265471563b7ba789cc21
SH256 hash:
26f8a0a43d60677f6b58e9e14ed9aa48c2a2af4b113a8200454ca50cd088ded5
MD5 hash:
3cb483087e0a2ff1e58514c46ffa8b12
SHA1 hash:
c2990ae6bd636b01c7e74b95bd1207a04ba09b7a
SH256 hash:
de3d756629d94963aee1412cabae2707e9299cd9b6781e6b0628f87e4db20fa5
MD5 hash:
046fa4e8a1c355f606a89be8d4a6fef8
SHA1 hash:
b850218f22edd8b50bae7161ea9ec74a57abd20d
SH256 hash:
fa28f9b07403390be50ffe3d1df25884a9e61c2edeafa194d0c37b4c51a720f3
MD5 hash:
b8d3f021d5218d8fa6ce7bf90456358b
SHA1 hash:
918a022a5f09e3c5e6ca737bd5dbc5514c9af7fe
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments