MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1ecc353c089e2581af25543adfbcf3d1600d622c5f908a4012e2f73b6d38fc3f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ResolverRAT


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 1ecc353c089e2581af25543adfbcf3d1600d622c5f908a4012e2f73b6d38fc3f
SHA3-384 hash: f51ebdd761c8f7a8a8842b5f2d2fb639b1e215fae1e9d9e2b178cf3e6c72f8423a377ca1152475e37e0567fa9d4ca722
SHA1 hash: 7303523b1d86d89ba5c48e19a1957259275a6349
MD5 hash: c7bf7ee6dd69677b2733badee854c7d1
humanhash: utah-orange-chicken-oxygen
File name:qyWSUTe.bat
Download: download sample
Signature ResolverRAT
File size:1'239 bytes
First seen:2025-05-26 15:13:34 UTC
Last seen:Never
File type:Batch (bat) bat
MIME type:text/x-msdos-batch
ssdeep 24:85CE3w+E3VacnGQO7g4atljDjVWpYVdB0TljD9s97c/fUf+4/JH1E3qafljD7:eV3w530oGr7g4atlHpWkBMlH9l/8m4U5
Threatray 262 similar samples on MalwareBazaar
TLSH T1E92178203EA90C7F432231BA42C4817DD8E5F79999105B6471EC0D85531DBA61BEEEBC
Magika batch
Reporter abuse_ch
Tags:bat ResolverRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
112
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
random.exe
Verdict:
Malicious activity
Analysis date:
2025-05-25 15:43:46 UTC
Tags:
auto-sch amadey loader botnet stealer rdp stegocampaign ta558 apt payload reverseloader lumma telegram xmrig arch-exec antivm

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
90.2%
Tags:
shell spawn sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Running batch commands
Searching for the window
Launching a process
Creating a file
Connection attempt to an infection source
DNS request
Connection attempt
Sending an HTTP GET request
Creating a process from a recently created file
Сreating synchronization primitives
Sending a custom TCP request
Query of malicious DNS domain
Sending a TCP request to an infection source
Unauthorized injection to a system process
Result
Threat name:
PureCrypter, ResolverRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Allocates memory in foreign processes
Detected PureCrypter Trojan
Found direct / indirect Syscall (likely to bypass EDR)
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Multi AV Scanner detection for dropped file
Powershell drops PE file
Uses threadpools to delay analysis
Writes to foreign memory regions
Yara detected ResolverRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1699353 Sample: qyWSUTe.bat Startdate: 26/05/2025 Architecture: WINDOWS Score: 100 42 getbae-ai.com 2->42 62 Multi AV Scanner detection for dropped file 2->62 64 Yara detected ResolverRAT 2->64 66 .NET source code contains potential unpacker 2->66 68 2 other signatures 2->68 9 cmd.exe 1 2->9         started        11 svchost.exe 1 1 2->11         started        signatures3 process4 process5 13 cmd.exe 5 9->13         started        15 conhost.exe 9->15         started        process6 17 vnch.exe 1 13->17         started        20 powershell.exe 29 13->20         started        23 curl.exe 2 13->23         started        26 conhost.exe 13->26         started        dnsIp7 50 Writes to foreign memory regions 17->50 52 Allocates memory in foreign processes 17->52 54 Injects a PE file into a foreign processes 17->54 56 Found direct / indirect Syscall (likely to bypass EDR) 17->56 28 InstallUtil.exe 2 17->28         started        32 conhost.exe 17->32         started        34 AddInProcess32.exe 17->34         started        36 C:\winsystem\vnch4\vnch.exe, PE32+ 20->36 dropped 38 C:\winsystem\vnch4\msys-ncursesw6.dll, PE32+ 20->38 dropped 40 C:\winsystem\vnch4\msys-2.0.dll, PE32+ 20->40 dropped 58 Loading BitLocker PowerShell Module 20->58 60 Powershell drops PE file 20->60 44 getbae-ai.com 172.86.82.131, 443, 49683 M247GB United States 23->44 46 127.0.0.1 unknown unknown 23->46 file8 signatures9 process10 dnsIp11 48 45.141.87.200, 49687, 49695, 49697 CLOUDBACKBONERU Russian Federation 28->48 70 Found many strings related to Crypto-Wallets (likely being stolen) 28->70 72 Uses threadpools to delay analysis 28->72 74 Detected PureCrypter Trojan 28->74 signatures12
Threat name:
Script-BAT.Downloader.AsyncRAT
Status:
Malicious
First seen:
2025-05-25 18:46:51 UTC
File Type:
Text (Batch)
AV detection:
8 of 38 (21.05%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: PowerShell
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Executes dropped EXE
Loads dropped DLL
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ResolverRAT

Batch (bat) bat 1ecc353c089e2581af25543adfbcf3d1600d622c5f908a4012e2f73b6d38fc3f

(this sample)

  
Delivery method
Distributed via web download

Comments