MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 399a0e77326dc484fa92fd5f95f2dbd89866dfd4e7e80661634a9a83f0652403. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 14


Intelligence 14 IOCs YARA 3 File information Comments

SHA256 hash: 399a0e77326dc484fa92fd5f95f2dbd89866dfd4e7e80661634a9a83f0652403
SHA3-384 hash: eca5b6c0fc2b648526359c46f15a485c466d5f98d73957b533a763ea66372b211b3a64d0b68ce6193f4b9d4eae316232
SHA1 hash: 17e209b6d6c66882ed78a40d7e0d211760b489a0
MD5 hash: 2cbd5d9d43c5c49f0580975e9e620808
humanhash: sierra-pennsylvania-nitrogen-mango
File name:pllmmdiipm.exe
Download: download sample
Signature AsyncRAT
File size:15'368'704 bytes
First seen:2022-11-11 07:19:45 UTC
Last seen:2022-12-06 06:56:42 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'608 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 196608:X0hLU8m9T9crlNBd8Sbrlzg0IzM7djVK2:khA595q38SbBs0IzM3
Threatray 4'726 similar samples on MalwareBazaar
TLSH T118F6FB9C726072DFC857D472DEA82DA8EA5178BB931F4203902715ADEE4D89BDF140F2
TrID 74.4% (.RLL) Microsoft Resource Library (x86) (177572/6/26)
13.0% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
4.4% (.EXE) Win64 Executable (generic) (10523/12/4)
2.7% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter tcains1
Tags:AsyncRAT exe

Intelligence


File Origin
# of uploads :
3
# of downloads :
189
Origin country :
US US
Vendor Threat Intelligence
Malware family:
asyncrat
ID:
1
File name:
pllmmdiipm.exe
Verdict:
Malicious activity
Analysis date:
2022-11-05 03:09:58 UTC
Tags:
asyncrat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Enabling the 'hidden' option for analyzed file
Launching a process
Creating a file
Сreating synchronization primitives
Enabling autorun by creating a file
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
confuserex ieexec.exe keylogger packed shell32.dll stealer
Result
Verdict:
MALICIOUS
Result
Threat name:
AsyncRAT, PhoenixRAT
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Detected unpacking (changes PE section rights)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AsyncRAT
Yara detected Generic Downloader
Yara detected PhoenixRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 743778 Sample: pllmmdiipm.exe Startdate: 11/11/2022 Architecture: WINDOWS Score: 100 32 Malicious sample detected (through community Yara rule) 2->32 34 Multi AV Scanner detection for submitted file 2->34 36 Yara detected PhoenixRAT 2->36 38 7 other signatures 2->38 6 pllmmdiipm.exe 3 2->6         started        10 pllmmdiipm.exe 2 2->10         started        12 pllmmdiipm.exe 2 2->12         started        process3 file4 28 C:\Users\user\AppData\...\pllmmdiipm.exe.log, ASCII 6->28 dropped 40 Detected unpacking (changes PE section rights) 6->40 14 RegAsm.exe 2 6->14         started        17 WerFault.exe 3 10 10->17         started        20 WerFault.exe 10->20         started        22 WerFault.exe 10 12->22         started        signatures5 process6 dnsIp7 30 85.105.88.221, 2531 TTNETTR Turkey 14->30 24 C:\ProgramData\Microsoft\...\Report.wer, Unicode 17->24 dropped 26 C:\ProgramData\Microsoft\...\Report.wer, Unicode 22->26 dropped file8
Threat name:
Win32.Backdoor.AsyncRAT
Status:
Malicious
First seen:
2022-11-05 06:44:37 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
28 of 41 (68.29%)
Threat level:
  5/5
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat botnet:system guard runtime rat
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Executes dropped EXE
Async RAT payload
AsyncRat
Malware Config
C2 Extraction:
85.105.88.221:2531
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
b761d6eac815a0bb592d78545a3af690eb9f46eaa65c9cc2d96ef2e0dbf6afbf
MD5 hash:
ace99a468a7a57549a1060dcd9937777
SHA1 hash:
eb62b235f4e1b5669874f6cbe6a0eacffee9edb5
SH256 hash:
caf863e43753c41c3f8d40719227e54edb9c8d1693704ab2cdfb362dc47e4b8a
MD5 hash:
9fe58c6f31fd8c7d36641eb042272626
SHA1 hash:
dc96765fd607847c0260aec1b184cdd40b16e22a
SH256 hash:
45a53f3220e08dfdb14739cf714540a14cbf203b9ac2ec6d8e7ae88f59171491
MD5 hash:
babb410932a0b0850c69e373c918198f
SHA1 hash:
9768b70e1da4be2c4acdddbcd1627749b05b072b
Detections:
AsyncRAT win_asyncrat_w0
SH256 hash:
399a0e77326dc484fa92fd5f95f2dbd89866dfd4e7e80661634a9a83f0652403
MD5 hash:
2cbd5d9d43c5c49f0580975e9e620808
SHA1 hash:
17e209b6d6c66882ed78a40d7e0d211760b489a0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Distributed via drive-by

Comments