MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 13a16094d96f70d08628b6056bf2a0d4f1040e75712e44cad43cb296b2b09df3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 16


Intelligence 16 IOCs 1 YARA File information Comments

SHA256 hash: 13a16094d96f70d08628b6056bf2a0d4f1040e75712e44cad43cb296b2b09df3
SHA3-384 hash: a74188150ae1ad9e2685de0261e851322c1a64b48d40cdd3af002e3e25077939fd384e6adf3fabb835adb18c8bb3a0bb
SHA1 hash: 1388d37092a72b095ecb3ba7505baa8a9202af87
MD5 hash: a628d1ea39c9f0189fe6b631a3256c0e
humanhash: friend-virginia-hotel-nuts
File name:A628D1EA39C9F0189FE6B631A3256C0E.exe
Download: download sample
Signature AsyncRAT
File size:1'420'800 bytes
First seen:2024-09-09 17:35:17 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'606 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 24576:x6NRIteVcVbQkc/R3u5NUi3DBhX+zjKx3TMKR3nDqFM0mr29XbN:60nQkcJ3S53DbGKxTMOTb0mr29L
Threatray 1'340 similar samples on MalwareBazaar
TLSH T191659D33BA478EB1C34A673BC19704142F28DE816217DB1FF98A379978B33E66A45507
TrID 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.7% (.EXE) Win64 Executable (generic) (10523/12/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.1% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
File icon (PE):PE icon
dhash icon 5833e0ccccc8c11c (1 x RevengeRAT, 1 x AsyncRAT)
Reporter abuse_ch
Tags:AsyncRAT exe RAT


Avatar
abuse_ch
AsyncRAT C2:
64.188.9.175:3007

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
64.188.9.175:3007 https://threatfox.abuse.ch/ioc/1322727/

Intelligence


File Origin
# of uploads :
1
# of downloads :
535
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
asyncrat
ID:
1
File name:
A628D1EA39C9F0189FE6B631A3256C0E.exe
Verdict:
Malicious activity
Analysis date:
2024-09-09 17:36:41 UTC
Tags:
asyncrat rat remote netreactor

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
93.3%
Tags:
Stealth Nekark
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %AppData% directory
Launching a process
Сreating synchronization primitives
DNS request
Connection attempt
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
net_reactor packed packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AsyncRAT, PureLog Stealer
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected AsyncRAT
Yara detected Costura Assembly Loader
Yara detected PureLog Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1508165 Sample: GLP3VibiyA.exe Startdate: 09/09/2024 Architecture: WINDOWS Score: 100 26 dominiharrypotter202420242024.duckdns.org 2->26 28 bg.microsoft.map.fastly.net 2->28 32 Suricata IDS alerts for network traffic 2->32 34 Malicious sample detected (through community Yara rule) 2->34 36 Antivirus / Scanner detection for submitted sample 2->36 40 8 other signatures 2->40 7 GLP3VibiyA.exe 1 4 2->7         started        11 Ylhzvrqx.exe 2 2->11         started        13 Ylhzvrqx.exe 2 2->13         started        signatures3 38 Uses dynamic DNS services 26->38 process4 file5 22 C:\Users\user\AppData\Roaming\Ylhzvrqx.exe, PE32 7->22 dropped 24 C:\Users\...\Ylhzvrqx.exe:Zone.Identifier, ASCII 7->24 dropped 42 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 7->42 44 Writes to foreign memory regions 7->44 46 Injects a PE file into a foreign processes 7->46 15 aspnet_compiler.exe 2 7->15         started        48 Antivirus detection for dropped file 11->48 50 Multi AV Scanner detection for dropped file 11->50 52 Machine Learning detection for dropped file 11->52 18 aspnet_compiler.exe 3 11->18         started        20 aspnet_compiler.exe 2 13->20         started        signatures6 process7 dnsIp8 30 dominiharrypotter202420242024.duckdns.org 64.188.9.175, 3008, 49730 ASN-QUADRANET-GLOBALUS United States 15->30
Threat name:
ByteCode-MSIL.Trojan.PureLogsStealer
Status:
Malicious
First seen:
2024-09-07 01:34:43 UTC
File Type:
PE (.Net Exe)
Extracted files:
12
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Adds Run key to start application
Suspicious use of NtCreateUserProcessOtherParentProcess
Unpacked files
SH256 hash:
2b4f066dc78521fe0deafb290a0ed1821fd669e2f6c4d74f736469f569797b61
MD5 hash:
e17dba8c1d63b9113139e4f646b3dbf8
SHA1 hash:
76e464fd23e46ac45748079cb302c0af0a0b37db
Detections:
win_asyncrat_w0 SUSP_OBF_NET_Reactor_Indicators_Jan24 asyncrat
SH256 hash:
19efdf03cb94895935225795f68bb9abfded1869687367013b8b4eee3cc99372
MD5 hash:
4e29f75c0c51b9dec76955f0382d9541
SHA1 hash:
4899aa8e3f57339cbaec8faab777897a76fe1c3a
SH256 hash:
3f55d9f8db5061d1df75f2da30a20707256a82cd44e1f673e826c61c1ac732c6
MD5 hash:
3e731df192388e9910ca8306d4900513
SHA1 hash:
21773ed3f7ec1d91d169967ad1248af23eb1ae26
SH256 hash:
ca1ae12ebc8f7e455c88b32a15584b2f0288b70ab55bce92fedc12097175ac7b
MD5 hash:
8fedc40edd6c61f05b12915fb67cf62c
SHA1 hash:
10527a4dac1f9af707f4170191bc682c6d6ad3c9
Detections:
INDICATOR_EXE_Packed_SmartAssembly
SH256 hash:
613f450c8673fdc71da7d3082589238aedccbc4421f5581deb8721f8cf6b89df
MD5 hash:
5f4f281565f11b6c445254cd0c1dde79
SHA1 hash:
087114502ef035ba71eef71a7e6e2478dd5abeee
SH256 hash:
a919d1ac9391ae25657eb8e9017995e1b04be09d4f03b55c1af23f5b024f25ab
MD5 hash:
8b14e15714b6817f4087936df26d467b
SHA1 hash:
143ba72f2d46d7a25d9d5561b0006020bdff6b54
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
13a16094d96f70d08628b6056bf2a0d4f1040e75712e44cad43cb296b2b09df3
MD5 hash:
a628d1ea39c9f0189fe6b631a3256c0e
SHA1 hash:
1388d37092a72b095ecb3ba7505baa8a9202af87
Detections:
SUSP_OBF_NET_Eazfuscator_String_Encryption_Jan24
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high

Comments