MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 24dd076d459eec17914c34478bfa67bbcb3803e3a3c4d2684d62c087cff7e35c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 12


Intelligence 12 IOCs YARA 1 File information Comments

SHA256 hash: 24dd076d459eec17914c34478bfa67bbcb3803e3a3c4d2684d62c087cff7e35c
SHA3-384 hash: 88de43e764f176100af0829c426a46231be6c9b0c2906af79e1784d637e18fafb9897c7e5d7e67b55d2d7d2d12c6a676
SHA1 hash: d5eaee93a9683bf01463a2b4207172b59351068b
MD5 hash: 47767d805b3fe511c2789dad7bf04a05
humanhash: princess-alaska-solar-violet
File name:rtx.bat
Download: download sample
File size:1'942 bytes
First seen:2025-05-23 13:57:25 UTC
Last seen:Never
File type:Batch (bat) bat
MIME type:text/x-msdos-batch
ssdeep 48:ujoMGGi/xajg47AeuvELPn3Zmto9q6Fyp1Hqy4lxe7L8LAlz9sDlqRSM:ujoM/s8s4Ee7LfZmtSfwp1Hqyqxev1vh
Threatray 43 similar samples on MalwareBazaar
TLSH T1CA41FDAB5883590C0671EFE1858A41AAD31EC2C60741EFCCF5E08495B43929A42EE98F
Magika batch
Reporter abuse_ch
Tags:bat

Intelligence


File Origin
# of uploads :
1
# of downloads :
59
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
asyncrat
ID:
1
File name:
samples-downloader.zip
Verdict:
Malicious activity
Analysis date:
2025-05-23 12:30:41 UTC
Tags:
arch-exec arch-doc loader auto arrow rat lumma stealer generic rustystealer xworm asyncrat rhadamanthys gcleaner vidar loki ransomware chstealer formbook proxyware ghostsocks phishing snake keylogger telegram evasion inno installer delphi putty rmm-tool pyinstaller autoit amadey botnet remote screenconnect

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
dropper shell overt
Result
Verdict:
Malware
Maliciousness:

Behaviour
Running batch commands
Сreating synchronization primitives
DNS request
Connection attempt
Sending a custom TCP request
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Moving a file to the %temp% subdirectory
Searching for the window
Creating a file
Creating a process with a hidden window
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Launching a tool to kill processes
Downloading the file
Enabling autorun
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
bitsadmin certutil crypto fingerprint lolbin powershell
Result
Threat name:
n/a
Detection:
malicious
Classification:
spyw.evad
Score:
96 / 100
Signature
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Drops large PE files
Found many strings related to Crypto-Wallets (likely being stolen)
Found pyInstaller with non standard icon
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for submitted file
Powershell drops PE file
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Tries to download and execute files (via powershell)
Yara detected Powershell download and execute
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1697819 Sample: rtx.bat Startdate: 23/05/2025 Architecture: WINDOWS Score: 96 88 github.com 2->88 90 objects.githubusercontent.com 2->90 92 2 other IPs or domains 2->92 98 Multi AV Scanner detection for submitted file 2->98 100 Yara detected Powershell download and execute 2->100 102 Joe Sandbox ML detected suspicious sample 2->102 104 Sigma detected: Suspicious Script Execution From Temp Folder 2->104 11 cmd.exe 1 2->11         started        signatures3 process4 signatures5 114 Suspicious powershell command line found 11->114 116 Tries to download and execute files (via powershell) 11->116 14 cmd.exe 3 11->14         started        17 conhost.exe 11->17         started        process6 signatures7 118 Suspicious powershell command line found 14->118 120 Tries to download and execute files (via powershell) 14->120 19 128582390.exe 1001 14->19         started        23 powershell.exe 14 16 14->23         started        26 sys.exe 3 14->26         started        28 powershell.exe 16 14->28         started        process8 dnsIp9 62 C:\Users\user\AppData\Local\...\win32ui.pyd, PE32+ 19->62 dropped 64 C:\Users\user\AppData\...\win32trace.pyd, PE32+ 19->64 dropped 66 C:\Users\user\AppData\...\win32process.pyd, PE32+ 19->66 dropped 74 72 other files (none is malicious) 19->74 dropped 106 Found pyInstaller with non standard icon 19->106 30 128582390.exe 4 6 19->30         started        94 github.com 140.82.113.3, 443, 49715, 49717 GITHUBUS United States 23->94 96 objects.githubusercontent.com 185.199.111.133, 443, 49716, 49719 FASTLYUS Netherlands 23->96 68 C:\Users\user\AppData\Local\Temp\...\sys.exe, PE32 23->68 dropped 108 Found many strings related to Crypto-Wallets (likely being stolen) 23->108 110 Powershell drops PE file 23->110 70 C:\Users\user\AppData\Local\Temp\...\rtx.exe, PE32+ 26->70 dropped 112 Drops large PE files 26->112 72 C:\Users\user\AppData\Local\Temp\...\rtx.rar, RAR 28->72 dropped file10 signatures11 process12 file13 86 C:\Users\user\AppData\Local\...\csrr.hxh, PE32 30->86 dropped 122 Creates an undocumented autostart registry key 30->122 124 Found many strings related to Crypto-Wallets (likely being stolen) 30->124 126 Creates multiple autostart registry keys 30->126 34 cmd.exe 30->34         started        36 cmd.exe 1 30->36         started        38 cmd.exe 1 30->38         started        40 11 other processes 30->40 signatures14 process15 file16 43 mpc.exe 34->43         started        46 conhost.exe 34->46         started        48 conhost.exe 36->48         started        50 taskkill.exe 36->50         started        52 conhost.exe 38->52         started        54 taskkill.exe 38->54         started        76 C:\Users\user\AppData\Local\Temp\...\mpc.exe, PE32 40->76 dropped 56 conhost.exe 40->56         started        58 conhost.exe 40->58         started        60 19 other processes 40->60 process17 file18 78 C:\ProgramData\Samsung\win32event.pyd, PE32 43->78 dropped 80 C:\ProgramData\Samsung\win32api.pyd, PE32 43->80 dropped 82 C:\ProgramData\Samsung\unicodedata.pyd, PE32 43->82 dropped 84 11 other files (none is malicious) 43->84 dropped
Threat name:
Win32.Downloader.Cert
Status:
Malicious
First seen:
2025-05-23 13:58:27 UTC
File Type:
Text (Batch)
AV detection:
6 of 24 (25.00%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery execution persistence spyware stealer
Behaviour
Delays execution with timeout.exe
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Adds Run key to start application
Looks up external IP address via web service
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
Downloads MZ/PE file
Modifies WinLogon for persistence
Malware Config
Dropper Extraction:
https://github.com/upsnorwayjs/dmx/releases/download/ttu3535/sys.exe
https://github.com/upsnorwayjs/dmx/releases/download/ttu3535/rtx.fbx
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Batch (bat) bat 24dd076d459eec17914c34478bfa67bbcb3803e3a3c4d2684d62c087cff7e35c

(this sample)

  
Delivery method
Distributed via web download

Comments