MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 16fc0cec13d88da3d0a36e4c42e733db8f1e21cafc18fd813a25cd0bc835f35a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 10


Intelligence 10 IOCs 1 YARA 3 File information Comments

SHA256 hash: 16fc0cec13d88da3d0a36e4c42e733db8f1e21cafc18fd813a25cd0bc835f35a
SHA3-384 hash: 90b44436a01d8f1e6f9cfaddafbf07d48300e3cdff73f9f93f81e11b2eed686977bea868a8c2e11546bf65985db5e39e
SHA1 hash: ee9af16a399b73b265cdbe7ec252156107459f99
MD5 hash: a369829113a0a8c5df8e1927c0f12345
humanhash: violet-burger-twelve-mississippi
File name:a369829113a0a8c5df8e1927c0f12345.exe
Download: download sample
Signature AsyncRAT
File size:1'204'736 bytes
First seen:2021-05-26 16:55:54 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'454 x Formbook, 12'202 x SnakeKeylogger)
ssdeep 24576:Ttv1ngTt6qvQFz29Jvt1kclxky5NMcJBiVAzJiZf6:0Q2n9ksNMcJwOz
Threatray 840 similar samples on MalwareBazaar
TLSH D2456BA83650729EC867C93289681CB4EAA17C76530BD60BA0D33E9CFA3D557DF144F2
Reporter abuse_ch
Tags:AsyncRAT exe RAT


Avatar
abuse_ch
AsyncRAT C2:
136.243.191.199:5900

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
136.243.191.199:5900 https://threatfox.abuse.ch/ioc/64473/

Intelligence


File Origin
# of uploads :
1
# of downloads :
103
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a369829113a0a8c5df8e1927c0f12345.exe
Verdict:
Malicious activity
Analysis date:
2021-05-26 22:39:13 UTC
Tags:
trojan rat asyncrat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AsyncRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Potentially malicious time measurement code found
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected AsyncRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 425292 Sample: cAkprChGtW.exe Startdate: 26/05/2021 Architecture: WINDOWS Score: 100 80 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->80 82 Found malware configuration 2->82 84 Antivirus / Scanner detection for submitted sample 2->84 86 9 other signatures 2->86 10 cAkprChGtW.exe 7 2->10         started        process3 file4 60 C:\Users\user\AppData\Local\...\tmp58CF.tmp, XML 10->60 dropped 62 C:\Users\user\AppData\...\cAkprChGtW.exe.log, ASCII 10->62 dropped 64 C:\Users\user\AppData\Roaming\AiWEmFj.exe, PE32 10->64 dropped 96 Detected unpacking (changes PE section rights) 10->96 98 Detected unpacking (overwrites its own PE header) 10->98 100 Uses schtasks.exe or at.exe to add and modify task schedules 10->100 102 3 other signatures 10->102 14 MSBuild.exe 2 5 10->14         started        19 schtasks.exe 1 10->19         started        signatures5 process6 dnsIp7 74 alemdar571.duckdns.org 136.243.191.199, 49721, 49725, 59 HETZNER-ASDE Germany 14->74 76 192.168.2.1 unknown unknown 14->76 66 C:\Users\user\AppData\Local\Temp\xyhvhv.exe, PE32 14->66 dropped 68 C:\Users\user\AppData\Local\Temp\fgdwyl.exe, PE32+ 14->68 dropped 78 Tries to harvest and steal browser information (history, passwords, etc) 14->78 21 cmd.exe 1 14->21         started        24 cmd.exe 1 14->24         started        26 conhost.exe 19->26         started        file8 signatures9 process10 signatures11 88 Suspicious powershell command line found 21->88 90 Bypasses PowerShell execution policy 21->90 28 powershell.exe 14 21->28         started        30 conhost.exe 21->30         started        32 powershell.exe 13 24->32         started        34 conhost.exe 24->34         started        process12 process13 36 fgdwyl.exe 62 28->36         started        40 xyhvhv.exe 32->40         started        file14 46 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 36->46 dropped 48 C:\Users\user\AppData\Local\...\ucrtbase.dll, PE32+ 36->48 dropped 50 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 36->50 dropped 58 56 other files (none is malicious) 36->58 dropped 92 May check the online IP address of the machine 36->92 94 Potentially malicious time measurement code found 36->94 42 fgdwyl.exe 1 36->42         started        52 C:\Users\user\AppData\Local\...\Process.exe, PE32 40->52 dropped 54 C:\Users\user\AppData\Local\...\Bypass.exe, PE32 40->54 dropped 56 C:\Users\user\AppData\Local\...\Defender.exe, PE32+ 40->56 dropped signatures15 process16 dnsIp17 70 ifconfig.me 34.117.59.81 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 42->70 72 discord.com 162.159.136.232 CLOUDFLARENETUS United States 42->72 104 Tries to harvest and steal browser information (history, passwords, etc) 42->104 signatures18
Threat name:
ByteCode-MSIL.Backdoor.Crysan
Status:
Malicious
First seen:
2021-05-22 01:28:40 UTC
AV detection:
17 of 29 (58.62%)
Threat level:
  5/5
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat pyinstaller rat spyware stealer
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Detects Pyinstaller
Enumerates physical storage devices
Suspicious use of SetThreadContext
Looks up external IP address via web service
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Async RAT payload
AsyncRat
Malware Config
C2 Extraction:
136.243.191.199:4784
136.243.191.199:18
136.243.191.199:5900
136.243.191.199:59
alemdar571.duckdns.org:4784
alemdar571.duckdns.org:18
alemdar571.duckdns.org:5900
alemdar571.duckdns.org:59
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFu
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments