MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0824eac1ce23de2321bce82efce874ab3c213d15f1a120d8ec08c85c7fbc250b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 16


Intelligence 16 IOCs YARA 28 File information Comments

SHA256 hash: 0824eac1ce23de2321bce82efce874ab3c213d15f1a120d8ec08c85c7fbc250b
SHA3-384 hash: 21d016d3c211a1182a5761585439c4ac8f8aa91a2392d49d6b3204140b94c7fb1dc35d1429cad0ccdad03b167afa0f95
SHA1 hash: b1ed1ffa34d4e909e30e8a3a299a22d5101380e1
MD5 hash: 093bc49ab25cc6a20d95155db80f1fa8
humanhash: blossom-mockingbird-nitrogen-nitrogen
File name:093bc49ab25cc6a20d95155db80f1fa8.exe
Download: download sample
Signature AsyncRAT
File size:771'764 bytes
First seen:2024-05-19 04:25:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 19382c1809079f98ee2ef03ee848205f (2 x AsyncRAT)
ssdeep 12288:mUvKFtlyYqn58iP23JOcXYkrCQNkfCVvd487NYe3VqiYT6K3ifW+Janl:glyY058i0OuIQNkfCb4IV2iW+Janl
Threatray 302 similar samples on MalwareBazaar
TLSH T169F4F152E295DCD4E61AB2F8A975AD2212273D59A8344A1A307F321D49B3393CC77F0F
TrID 55.6% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
16.9% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.9% (.ICL) Windows Icons Library (generic) (2059/9)
6.8% (.EXE) OS/2 Executable (generic) (2029/13)
6.7% (.EXE) Generic Win/DOS Executable (2002/3)
File icon (PE):PE icon
dhash icon 45d4c4dcf4c47211 (9 x AsyncRAT, 2 x AgentTesla, 2 x NanoCore)
Reporter abuse_ch
Tags:AsyncRAT exe RAT


Avatar
abuse_ch
AsyncRAT C2:
172.111.216.4:6606

Intelligence


File Origin
# of uploads :
1
# of downloads :
469
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
darkcomet
ID:
1
File name:
0824eac1ce23de2321bce82efce874ab3c213d15f1a120d8ec08c85c7fbc250b.exe
Verdict:
Malicious activity
Analysis date:
2024-05-19 04:27:33 UTC
Tags:
xenorat rat darkcomet remote asyncrat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
Banker Encryption Execution Network Stealth Variant Dexter
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a process with a hidden window
Сreating synchronization primitives
Creating a window
Creating a file
Enabling the 'hidden' option for recently created files
Launching a process
Setting a keyboard event handler
DNS request
Connection attempt
Sending a custom TCP request
Creating a file in the %AppData% directory
Running batch commands
Searching for the window
Using the Windows Management Instrumentation requests
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Enabling autorun
Changing the hosts file
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AsyncRAT, DarkComet
Detection:
malicious
Classification:
rans.troj.adwa.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to log keystrokes
Contains functionality to register a low level keyboard hook
Contains functionalty to change the wallpaper
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops PE files to the document folder of the user
Found evasive API chain (may stop execution after checking mutex)
Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the hosts file
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AsyncRAT
Yara detected DarkComet
Yara detected Generic Downloader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1443935 Sample: nsgp4wA6MZ.exe Startdate: 19/05/2024 Architecture: WINDOWS Score: 100 83 dgorijan20785.hopto.org 2->83 85 Snort IDS alert for network traffic 2->85 87 Multi AV Scanner detection for domain / URL 2->87 89 Found malware configuration 2->89 91 11 other signatures 2->91 11 nsgp4wA6MZ.exe 2 2->11         started        15 PRINTSERV.EXE 2->15         started        17 rar.exe 2->17         started        19 rar.exe 2->19         started        signatures3 process4 file5 75 C:\Users\user\AppData\Local\...\smsDC95.tmp, PE32 11->75 dropped 113 Detected unpacking (changes PE section rights) 11->113 115 Detected unpacking (overwrites its own PE header) 11->115 117 Found evasive API chain (may stop execution after checking mutex) 11->117 21 smsDC95.tmp 1 4 11->21         started        25 conhost.exe 11->25         started        signatures6 process7 file8 63 C:\Users\user\Documents\rar.exe, PE32 21->63 dropped 65 C:\Users\user\AppData\Local\...\PRINTSERV.EXE, PE32 21->65 dropped 67 C:\Users\user\AppData\Local\...\CHROMEL.EXE, PE32+ 21->67 dropped 69 C:\Windows\System32\drivers\etc\hosts, ASCII 21->69 dropped 97 Antivirus detection for dropped file 21->97 99 Multi AV Scanner detection for dropped file 21->99 101 Drops PE files to the document folder of the user 21->101 103 10 other signatures 21->103 27 CHROMEL.EXE 2 21->27         started        31 PRINTSERV.EXE 6 21->31         started        33 rar.exe 3 21->33         started        36 notepad.exe 21->36         started        signatures9 process10 dnsIp11 77 C:\Users\user\AppData\Local\...\smsDE79.tmp, PE32 27->77 dropped 119 Antivirus detection for dropped file 27->119 121 Multi AV Scanner detection for dropped file 27->121 123 Detected unpacking (changes PE section rights) 27->123 131 2 other signatures 27->131 38 smsDE79.tmp 7 27->38         started        42 conhost.exe 27->42         started        79 C:\Users\user\AppData\Local\...\PRINTSERV.EXE, PE32 31->79 dropped 125 Detected unpacking (overwrites its own PE header) 31->125 127 Machine Learning detection for dropped file 31->127 44 PRINTSERV.EXE 5 31->44         started        81 dgorijan20785.hopto.org 172.111.216.4, 35800, 4488, 49730 M247GB United States 33->81 129 Installs a global keyboard hook 33->129 file12 signatures13 process14 file15 71 C:\Users\user\AppData\Roaming\audiodrvs.exe, PE32 38->71 dropped 105 Antivirus detection for dropped file 38->105 107 Multi AV Scanner detection for dropped file 38->107 46 cmd.exe 38->46         started        48 schtasks.exe 38->48         started        73 C:\Users\user\AppData\Local\...\tmpF7DD.tmp, ASCII 44->73 dropped 109 Machine Learning detection for dropped file 44->109 111 Uses schtasks.exe or at.exe to add and modify task schedules 44->111 50 schtasks.exe 44->50         started        signatures16 process17 process18 52 audiodrvs.exe 46->52         started        55 conhost.exe 46->55         started        57 timeout.exe 46->57         started        59 conhost.exe 48->59         started        61 conhost.exe 50->61         started        signatures19 93 Antivirus detection for dropped file 52->93 95 Machine Learning detection for dropped file 52->95
Threat name:
Win64.Backdoor.CobaltStrike
Status:
Malicious
First seen:
2024-05-16 12:35:00 UTC
File Type:
PE+ (Exe)
Extracted files:
10
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
darkcomet
Score:
  10/10
Tags:
family:asyncrat family:darkcomet botnet:2024+may3333-newcrt persistence rat trojan upx
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
UPX packed file
Drops file in Drivers directory
Async RAT payload
AsyncRat
Darkcomet
Modifies WinLogon for persistence
Malware Config
C2 Extraction:
dgorijan20785.hopto.org:35800
dgorijan20785.hopto.org:6606
dgorijan20785.hopto.org:7707
dgorijan20785.hopto.org:8808
Unpacked files
SH256 hash:
0824eac1ce23de2321bce82efce874ab3c213d15f1a120d8ec08c85c7fbc250b
MD5 hash:
093bc49ab25cc6a20d95155db80f1fa8
SHA1 hash:
b1ed1ffa34d4e909e30e8a3a299a22d5101380e1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:CMD_Ping_Localhost
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:INDICATOR_EXE_Packed_eXPressor
Author:ditekSHen
Description:Detects executables packed with eXPressor
Rule name:Intezer_Vaccine_DarkComet
Author:Intezer Labs
Description:Automatic YARA vaccination rule created based on the file's genes
Reference:https://analyze.intezer.com
Rule name:Malware_QA_update
Author:Florian Roth (Nextron Systems)
Description:VT Research QA uploaded malware - file update.exe
Reference:VT Research QA
Rule name:Malware_QA_update_RID2DAD
Author:Florian Roth
Description:VT Research QA uploaded malware - file update.exe
Reference:VT Research QA
Rule name:MALWARE_Win_DarkComet
Author:ditekSHen
Description:Detects DarkComet
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:RAT_DarkComet
Author:Kevin Breen <kevin@techanarchy.net>
Description:Detects DarkComet RAT
Reference:http://malwareconfig.com/stats/DarkComet
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:UPX20030XMarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:UPXv20MarkusLaszloReiser
Author:malware-lu
Rule name:upx_1_00_to_1_07
Author:Kevin Falcoz
Description:UPX 1.00 to 1.07
Rule name:upx_3
Author:Kevin Falcoz
Description:UPX 3.X
Rule name:Windows_Trojan_Darkcomet_1df27bcc
Author:Elastic Security
Rule name:win_darkcomet_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments