MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0d2f35d0e9050bbdf5ff8ec71e84a50c4fd2a825f6d46bf979b0755c2033c776. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 0d2f35d0e9050bbdf5ff8ec71e84a50c4fd2a825f6d46bf979b0755c2033c776
SHA3-384 hash: 4d9880f572b737e2839a445e812d0e042623586febc7eaab2c373dd35a045627699128d1e2c8c02c56c552806cd2e588
SHA1 hash: 4933f1ddd3cd551570719d8d81db3155bbba44b1
MD5 hash: c213bfeb91ed171fd7ca76c7a46703d8
humanhash: nitrogen-kentucky-nuts-fanta
File name:PO#11-08052020,pdf.scr
Download: download sample
Signature AsyncRAT
File size:196'408 bytes
First seen:2020-08-05 13:07:30 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'659 x AgentTesla, 19'469 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 3072:OcR1Y+XQMyJ2LJeY0mbPLrkYmK1Ew8mcZWpnj/hKgg:OcDqMyJYJAcPX31Ew8bWOB
Threatray 310 similar samples on MalwareBazaar
TLSH 8A14748DA3020157F1196738C6AAFF1803711DBD7A96EBE4FDA4774BEDD07AA143201A
Reporter abuse_ch
Tags:AsyncRAT scr


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: cloudhost-77552.us-midwest-1.nxcli.net
Sending IP: 209.126.25.80
From: Elena <info@alhammra.com>
Subject: PO#11-05082020-URGENTE
Attachment: PO#11-08052020.IMG (contains "PO#11-08052020,pdf.scr")

Intelligence


File Origin
# of uploads :
1
# of downloads :
67
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Unauthorized injection to a recently created process
Creating a file
Sending a UDP request
Connection attempt
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun
Enabling autorun by creating a file
Result
Threat name:
AsyncRAT
Detection:
malicious
Classification:
troj.adwa.evad
Score:
84 / 100
Signature
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Binary contains a suspicious time stamp
Creates an undocumented autostart registry key
Creates autostart registry keys with suspicious names
Drops PE files to the startup folder
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AsyncRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 257985 Sample: PO#11-08052020,pdf.scr Startdate: 05/08/2020 Architecture: WINDOWS Score: 84 37 Yara detected AsyncRAT 2->37 39 .NET source code references suspicious native API functions 2->39 41 .NET source code contains very large array initializations 2->41 43 3 other signatures 2->43 6 PO#11-08052020,pdf.exe 2 5 2->6         started        10 PO#11-08052020,pdf.exe 5 2->10         started        12 PO#11-08052020,pdf.exe 5 2->12         started        14 PO#11-08052020,pdf.exe 5 2->14         started        process3 file4 31 C:\Users\user\...\PO#11-08052020,pdf.exe, PE32 6->31 dropped 33 C:\...\PO#11-08052020,pdf.exe:Zone.Identifier, ASCII 6->33 dropped 45 Creates an undocumented autostart registry key 6->45 47 Drops PE files to the startup folder 6->47 49 Injects a PE file into a foreign processes 6->49 16 PO#11-08052020,pdf.exe 2 6->16         started        19 PO#11-08052020,pdf.exe 6->19         started        51 Creates autostart registry keys with suspicious names 10->51 21 PO#11-08052020,pdf.exe 2 10->21         started        23 PO#11-08052020,pdf.exe 10->23         started        25 PO#11-08052020,pdf.exe 10->25         started        27 PO#11-08052020,pdf.exe 2 12->27         started        29 PO#11-08052020,pdf.exe 2 14->29         started        signatures5 process6 dnsIp7 35 206.123.129.103, 5456 VOXILITYGB United States 16->35
Threat name:
ByteCode-MSIL.Backdoor.NanoCore
Status:
Malicious
First seen:
2020-08-05 13:09:09 UTC
AV detection:
19 of 29 (65.52%)
Threat level:
  5/5
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
rat persistence family:asyncrat
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Drops startup file
Async RAT payload
Modifies WinLogon for persistence
AsyncRat
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AsyncRAT

Executable exe 0d2f35d0e9050bbdf5ff8ec71e84a50c4fd2a825f6d46bf979b0755c2033c776

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments