MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c54b60f2101b09c68669821453bf68653d2bcc7b9030a13edd5486a387a11cab. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: c54b60f2101b09c68669821453bf68653d2bcc7b9030a13edd5486a387a11cab
SHA3-384 hash: d7c1d9ece9139568b290cb5e11c4c687ad7af28a0b262f5f51ecec9e60e71f4b5685f1c274253e12ddb251a51a3e1e71
SHA1 hash: 120c552f5c8f72d6be335e1be32bf149c0ed9f59
MD5 hash: 43526ea354ab03e7711402852fd68d42
humanhash: table-neptune-north-eleven
File name:Order Inquiry List.exe
Download: download sample
Signature AsyncRAT
File size:261'632 bytes
First seen:2020-05-05 13:23:58 UTC
Last seen:2020-05-05 13:59:37 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 6144:TFReki7IuH/8hYvKgT69KepKdAD47lUwscIF:TFRil/ti3pKd17nsj
Threatray 555 similar samples on MalwareBazaar
TLSH EE44A00BE7D8D25FCABE4E79E045065A037DEB179B62F79B5E4424EFB4437429802232
Reporter abuse_ch
Tags:AsyncRAT exe nVpn RAT


Avatar
abuse_ch
Malspam distributing AsyncRAT:

HELO: grupoprornedca.com
Sending IP: 66.85.79.178
From: Steve <hmrc@grupoprornedca.com>
Subject: Re: Quotation
Attachment: Order Inquiry List.rar (contains "Order Inquiry List.exe")

AsyncRAT C2:
mendey.duckdns.org:2333 (79.134.225.70)

Pointing to nVpn:

% Information related to '79.134.225.64 - 79.134.225.127'

% Abuse contact for '79.134.225.64 - 79.134.225.127' is 'abuse@your-vpn.network'

inetnum: 79.134.225.64 - 79.134.225.127
netname: YOUR_VPN_NETWORK
country: DE
remarks: ****************************************************
remarks: This subnet belongs to a VPN service provider.
remarks: We protect the right to privacy, which means
remarks: we don't log the activities of our users.
remarks: ****************************************************
admin-c: EH4074-RIPE
tech-c: YVN10-RIPE
status: ASSIGNED PA
abuse-c: YVN10-RIPE
org: ORG-YVN1-RIPE
mnt-by: AF15-MNT
created: 2019-07-19T18:26:38Z
last-modified: 2019-07-19T18:51:28Z
source: RIPE

Intelligence


File Origin
# of uploads :
2
# of downloads :
103
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Crysan
Status:
Malicious
First seen:
2020-05-05 13:35:43 UTC
File Type:
PE (.Net Exe)
Extracted files:
18
AV detection:
22 of 31 (70.97%)
Threat level:
  5/5
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Async RAT payload
AsyncRat
Malware Config
C2 Extraction:
mendey.duckdns.org:2333
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

63eaa46cca0fc48f11ae11fa28220dcc

AsyncRAT

Executable exe c54b60f2101b09c68669821453bf68653d2bcc7b9030a13edd5486a387a11cab

(this sample)

  
Dropped by
MD5 63eaa46cca0fc48f11ae11fa28220dcc
  
Delivery method
Distributed via e-mail attachment

Comments