MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 13a16094d96f70d08628b6056bf2a0d4f1040e75712e44cad43cb296b2b09df3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AsyncRAT
Vendor detections: 16
| SHA256 hash: | 13a16094d96f70d08628b6056bf2a0d4f1040e75712e44cad43cb296b2b09df3 |
|---|---|
| SHA3-384 hash: | a74188150ae1ad9e2685de0261e851322c1a64b48d40cdd3af002e3e25077939fd384e6adf3fabb835adb18c8bb3a0bb |
| SHA1 hash: | 1388d37092a72b095ecb3ba7505baa8a9202af87 |
| MD5 hash: | a628d1ea39c9f0189fe6b631a3256c0e |
| humanhash: | friend-virginia-hotel-nuts |
| File name: | A628D1EA39C9F0189FE6B631A3256C0E.exe |
| Download: | download sample |
| Signature | AsyncRAT |
| File size: | 1'420'800 bytes |
| First seen: | 2024-09-09 17:35:17 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'606 x Formbook, 12'242 x SnakeKeylogger) |
| ssdeep | 24576:x6NRIteVcVbQkc/R3u5NUi3DBhX+zjKx3TMKR3nDqFM0mr29XbN:60nQkcJ3S53DbGKxTMOTb0mr29L |
| Threatray | 1'340 similar samples on MalwareBazaar |
| TLSH | T191659D33BA478EB1C34A673BC19704142F28DE816217DB1FF98A379978B33E66A45507 |
| TrID | 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 9.7% (.EXE) Win64 Executable (generic) (10523/12/4) 6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 4.1% (.EXE) Win32 Executable (generic) (4504/4/1) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | 5833e0ccccc8c11c (1 x RevengeRAT, 1 x AsyncRAT) |
| Reporter | |
| Tags: | AsyncRAT exe RAT |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 64.188.9.175:3007 | https://threatfox.abuse.ch/ioc/1322727/ |
Intelligence
File Origin
# of uploads :
1
# of downloads :
535
Origin country :
NLVendor Threat Intelligence
Malware family:
asyncrat
ID:
1
File name:
A628D1EA39C9F0189FE6B631A3256C0E.exe
Verdict:
Malicious activity
Analysis date:
2024-09-09 17:36:41 UTC
Tags:
asyncrat rat remote netreactor
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
93.3%
Tags:
Stealth Nekark
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Creating a file in the %AppData% directory
Launching a process
Сreating synchronization primitives
DNS request
Connection attempt
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
net_reactor packed packed
Verdict:
Malicious
Labled as:
Jalapeno.Generic
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
Result
Threat name:
AsyncRAT, PureLog Stealer
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected AsyncRAT
Yara detected Costura Assembly Loader
Yara detected PureLog Stealer
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
PE
Threat name:
ByteCode-MSIL.Trojan.PureLogsStealer
Status:
Malicious
First seen:
2024-09-07 01:34:43 UTC
File Type:
PE (.Net Exe)
Extracted files:
12
AV detection:
17 of 24 (70.83%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 1'330 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
10/10
Tags:
discovery persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Adds Run key to start application
Suspicious use of NtCreateUserProcessOtherParentProcess
Verdict:
Malicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
2b4f066dc78521fe0deafb290a0ed1821fd669e2f6c4d74f736469f569797b61
MD5 hash:
e17dba8c1d63b9113139e4f646b3dbf8
SHA1 hash:
76e464fd23e46ac45748079cb302c0af0a0b37db
Detections:
win_asyncrat_w0
SUSP_OBF_NET_Reactor_Indicators_Jan24
asyncrat
SH256 hash:
19efdf03cb94895935225795f68bb9abfded1869687367013b8b4eee3cc99372
MD5 hash:
4e29f75c0c51b9dec76955f0382d9541
SHA1 hash:
4899aa8e3f57339cbaec8faab777897a76fe1c3a
SH256 hash:
3f55d9f8db5061d1df75f2da30a20707256a82cd44e1f673e826c61c1ac732c6
MD5 hash:
3e731df192388e9910ca8306d4900513
SHA1 hash:
21773ed3f7ec1d91d169967ad1248af23eb1ae26
SH256 hash:
ca1ae12ebc8f7e455c88b32a15584b2f0288b70ab55bce92fedc12097175ac7b
MD5 hash:
8fedc40edd6c61f05b12915fb67cf62c
SHA1 hash:
10527a4dac1f9af707f4170191bc682c6d6ad3c9
Detections:
INDICATOR_EXE_Packed_SmartAssembly
Parent samples :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 hash:
613f450c8673fdc71da7d3082589238aedccbc4421f5581deb8721f8cf6b89df
MD5 hash:
5f4f281565f11b6c445254cd0c1dde79
SHA1 hash:
087114502ef035ba71eef71a7e6e2478dd5abeee
SH256 hash:
a919d1ac9391ae25657eb8e9017995e1b04be09d4f03b55c1af23f5b024f25ab
MD5 hash:
8b14e15714b6817f4087936df26d467b
SHA1 hash:
143ba72f2d46d7a25d9d5561b0006020bdff6b54
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
13a16094d96f70d08628b6056bf2a0d4f1040e75712e44cad43cb296b2b09df3
MD5 hash:
a628d1ea39c9f0189fe6b631a3256c0e
SHA1 hash:
1388d37092a72b095ecb3ba7505baa8a9202af87
Detections:
SUSP_OBF_NET_Eazfuscator_String_Encryption_Jan24
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
No further information available
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (GUARD_CF) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.