MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0b84557ffcb246109b37598a3a82d7e5fdd2c2871e24e16958609c3b2e69f4bd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 10


Intelligence 10 IOCs YARA 2 File information Comments

SHA256 hash: 0b84557ffcb246109b37598a3a82d7e5fdd2c2871e24e16958609c3b2e69f4bd
SHA3-384 hash: eda71e9793bfcfffaff4b3ce1772aac50f6cba60a74dc324ffb9532af617a0a7547955af2bc10470a8ab7f3f420113b0
SHA1 hash: 13a70b4b2d8d17a1008f0288c9044ee1fe96a512
MD5 hash: 3f81fd18c5f3f55661cea70f68e5be68
humanhash: rugby-william-table-monkey
File name:2025台灣進口滯期費費率調整通知.pdf- REVISED.JS
Download: download sample
Signature AsyncRAT
File size:6'585'538 bytes
First seen:2025-05-30 11:05:59 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 192:gRqyNNFMfcRMToHvsE3cCL6jAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3:ni/OXDp8SRxHqDi0003
TLSH T14F668F40FE0666C4C7175D7E2E207F9D1CA5D1B7A3E7BB1C37226CD2A928848E1E2D25
Magika javascript
Reporter abuse_ch
Tags:AsyncRAT js

Intelligence


File Origin
# of uploads :
1
# of downloads :
407
Origin country :
NL NL
Vendor Threat Intelligence
Verdict:
Malicious
Score:
94.9%
Tags:
autorun xtreme shell sage
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
base64 evasive lolbin obfuscated persistence powershell schtasks
Verdict:
Suspicious
Labled as:
SVM:TrojanDownloader/JS.Nemucod
Result
Threat name:
n/a
Detection:
suspicious
Classification:
n/a
Score:
22 / 100
Signature
Sigma detected: WScript or CScript Dropper
Behaviour
Behavior Graph:
Threat name:
Script-JS.Downloader.Malgent
Status:
Malicious
First seen:
2025-05-29 13:32:54 UTC
File Type:
Binary
AV detection:
7 of 24 (29.17%)
Threat level:
  3/5
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat botnet:daddy discovery execution rat
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Command and Scripting Interpreter: JavaScript
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
AsyncRat
Asyncrat family
Malware Config
C2 Extraction:
plausa.camdvr.org:51027
plausa.camdvr.org:61078
Dropper Extraction:
http://valhmar.com/eYFekYJM/giphy.gif
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Base64_Encoded_Powershell_Directives
Rule name:SUSP_obfuscated_JS_obfuscatorio
Author:@imp0rtp3
Description:Detect JS obfuscation done by the js obfuscator (often malicious)
Reference:https://obfuscator.io

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments