MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3deec916d94fabdc65168ebd8b5f072a702781064d13b10700d9a52998a669a3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Vjw0rm


Vendor detections: 7


Intelligence 7 IOCs 1 YARA 2 File information Comments 1

SHA256 hash: 3deec916d94fabdc65168ebd8b5f072a702781064d13b10700d9a52998a669a3
SHA3-384 hash: 076f1fe19673e72b4d16136273151302165c8ba39d4ab37e842992786742c7cc6839e57800276728b5c01966f73d7a8a
SHA1 hash: a6121f8f7d8600c2278e90d5ae622c9b2d3b410b
MD5 hash: 200cb4b34ea0e61fe8454731bf7a107a
humanhash: victor-river-east-october
File name:200CB4B34EA0E61FE8454731BF7A107A.exe
Download: download sample
Signature Vjw0rm
File size:1'953'792 bytes
First seen:2021-04-18 08:00:20 UTC
Last seen:2021-04-18 08:53:43 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 49152:jssWIfbHO+7DGBtAJSKBw3NMuykVtknnfSYVIW+cC31ciF:jsxIfbItAPBw3NMxkKnfZic
Threatray 10 similar samples on MalwareBazaar
TLSH F0959E0673A1C1F6CA6782B5C9A5D232FA717C110B269ADB11E04E1FBF63BD15E3A710
Reporter abuse_ch
Tags:exe vjw0rm


Avatar
abuse_ch
Vjw0rm C2:
http://46.1.54.174:77/Vre

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://46.1.54.174:77/Vre https://threatfox.abuse.ch/ioc/8864/

Intelligence


File Origin
# of uploads :
2
# of downloads :
121
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
200CB4B34EA0E61FE8454731BF7A107A.exe
Verdict:
Suspicious activity
Analysis date:
2021-04-18 08:01:16 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %AppData% directory
Running batch commands
Creating a process from a recently created file
Creating a window
Creating a file
Launching a process
Creating a process with a hidden window
Creating a file in the %AppData% subdirectories
Using the Windows Management Instrumentation requests
Sending a UDP request
Sending an HTTP POST request
DNS request
Sending a custom TCP request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AsyncRAT
Detection:
malicious
Classification:
troj.adwa.evad
Score:
100 / 100
Signature
Bypasses PowerShell execution policy
Contains functionality to detect sleep reduction / modifications
Drops PE files to the startup folder
Drops VBS files to the startup folder
Dynamically executes javascript script code
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Sample or dropped binary is a compiled AutoHotkey binary
Sigma detected: Drops script at startup location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
Wscript starts Powershell (via cmd or directly)
Yara detected AsyncRAT
Yara detected Powershell download and execute
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 391271 Sample: xuXIetZvv6.exe Startdate: 18/04/2021 Architecture: WINDOWS Score: 100 84 www.uplooder.net 2->84 86 gist.githubusercontent.com 2->86 96 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->96 98 Malicious sample detected (through community Yara rule) 2->98 100 Multi AV Scanner detection for dropped file 2->100 102 9 other signatures 2->102 10 xuXIetZvv6.exe 4 6 2->10         started        13 conhost.exe 2->13         started        15 conhost.exe 2->15         started        17 4 other processes 2->17 signatures3 process4 file5 70 C:\Users\user\AppData\Roaming70e - Copy.exe, PE32+ 10->70 dropped 72 C:\Users\user\AppData\Roaming\winlogon.vbs, ASCII 10->72 dropped 74 C:\Users\user\AppData\...\xuXIetZvv6.exe.log, ASCII 10->74 dropped 19 Ne - Copy.exe 3 10->19         started        23 wscript.exe 1 10->23         started        25 cmd.exe 9 10->25         started        76 C:\Users\user\AppData\Roaming\...\conhost.exe, PE32+ 13->76 dropped 27 schtasks.exe 13->27         started        29 schtasks.exe 15->29         started        31 schtasks.exe 17->31         started        process6 file7 62 C:\ProgramData\conhost.exe, PE32+ 19->62 dropped 64 C:\Users\user\...\conhost.exe.manifest, MS 19->64 dropped 66 C:\ProgramData\conhost.exe.manifest, exported 19->66 dropped 104 Sample or dropped binary is a compiled AutoHotkey binary 19->104 33 conhost.exe 2 13 19->33         started        106 Suspicious powershell command line found 23->106 108 Wscript starts Powershell (via cmd or directly) 23->108 110 Bypasses PowerShell execution policy 23->110 37 powershell.exe 10 23->37         started        40 powershell.exe 14 19 23->40         started        42 conhost.exe 25->42         started        44 certutil.exe 3 2 25->44         started        52 2 other processes 25->52 46 conhost.exe 27->46         started        48 conhost.exe 29->48         started        50 conhost.exe 31->50         started        signatures8 process9 dnsIp10 78 46.1.54.174, 49709, 49713, 49715 MILLENICOM-ASDE Turkey 33->78 80 192.168.2.1 unknown unknown 33->80 88 Drops PE files to the startup folder 33->88 90 Uses schtasks.exe or at.exe to add and modify task schedules 33->90 92 Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes) 33->92 54 schtasks.exe 1 33->54         started        68 C:\Users\user\AppData\...\winlogon.vbs, ASCII 37->68 dropped 94 Drops VBS files to the startup folder 37->94 56 conhost.exe 37->56         started        82 www.uplooder.net 144.76.38.100, 443, 49711, 49722 HETZNER-ASDE Germany 40->82 58 conhost.exe 40->58         started        file11 signatures12 process13 process14 60 conhost.exe 54->60         started       
Gathering data
Result
Malware family:
Score:
  10/10
Tags:
family:asyncrat family:vjw0rm persistence rat trojan worm
Behaviour
Creates scheduled task(s)
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Views/modifies file attributes
Enumerates physical storage devices
Adds Run key to start application
Drops startup file
Loads dropped DLL
Blocklisted process makes network request
Executes dropped EXE
Async RAT payload
AsyncRat
Vjw0rm
Malware Config
C2 Extraction:
46.1.54.174:87
46.1.54.174:85
Dropper Extraction:
https://www.uplooder.net/f/tl/31/ee790edf8aa2f02c1ffb71003ad4a5c8/defender.mp3
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE).
Rule name:INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL
Author:ditekSHen
Description:Detects executables containing URLs to raw contents of a Github gist

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-04-18 09:17:48 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [C0019] Data Micro-objective::Check String
1) [C0026.001] Data Micro-objective::Base64::Encode Data
2) [B0023] Execution::Install Additional Program