MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 40c935ce8104afa8a498a4bde6146fb548e202370212ebbb7851ed443b3af510. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 14


Intelligence 14 IOCs 1 YARA 2 File information Comments

SHA256 hash: 40c935ce8104afa8a498a4bde6146fb548e202370212ebbb7851ed443b3af510
SHA3-384 hash: bd48853f46012178b996989b7c327e7d77e6318b7e3c0778d0b9f083f4c74af08015310d21bb3527bfb430c96bd6155a
SHA1 hash: 02745772a2fa58f222d16e70a190d3850b14d1a0
MD5 hash: afe82f228dc79fb9ba3f819ea237413a
humanhash: virginia-august-three-indigo
File name:IMAGE00933.exe
Download: download sample
Signature AsyncRAT
File size:822'272 bytes
First seen:2022-02-14 05:10:51 UTC
Last seen:2022-02-14 06:59:37 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'661 x AgentTesla, 19'474 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 24576:ZqzZIKLZygwr5Ubd8fUYLLSFauC0XGpN:cZIKtyPUkJLWe0Wv
Threatray 4'276 similar samples on MalwareBazaar
TLSH T1C105AC37EFD28D0DC1E58A75947C0DF0B663B93A8D86877AB059298B2AB33D60535037
File icon (PE):PE icon
dhash icon 4cb2b232d3c8c453 (1 x NetWire, 1 x AsyncRAT)
Reporter abuse_ch
Tags:AsyncRAT exe RAT


Avatar
abuse_ch
AsyncRAT C2:
173.249.17.53:2252

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
173.249.17.53:2252 https://threatfox.abuse.ch/ioc/387399/

Intelligence


File Origin
# of uploads :
2
# of downloads :
224
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Creating a file
Running batch commands
Creating a process with a hidden window
Launching a process
Gathering data
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Nanocore AsyncRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
Detected Nanocore Rat
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Sigma detected: NanoCore
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Suspicious Svchost Process
Sigma detected: Suspicius Add Task From User AppData Temp
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected AsyncRAT
Yara detected Costura Assembly Loader
Yara detected Nanocore RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 571568 Sample: IMAGE00933.exe Startdate: 14/02/2022 Architecture: WINDOWS Score: 100 83 podzeye.duckdns.org 2->83 87 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->87 89 Malicious sample detected (through community Yara rule) 2->89 91 Sigma detected: NanoCore 2->91 93 13 other signatures 2->93 12 windowsdefenders.exe 3 2->12         started        15 IMAGE00933.exe 3 2->15         started        signatures3 process4 signatures5 105 Multi AV Scanner detection for dropped file 12->105 107 Injects a PE file into a foreign processes 12->107 17 windowsdefenders.exe 2 4 12->17         started        22 IMAGE00933.exe 6 15->22         started        24 IMAGE00933.exe 15->24         started        26 svchost.exe 15->26         started        process6 dnsIp7 79 podzeye.duckdns.org 173.249.17.53, 2252, 313, 49748 CONTABODE Germany 17->79 81 192.168.2.1 unknown unknown 17->81 69 C:\Users\user\AppData\Local\Temp\sgkbcg.exe, PE32 17->69 dropped 95 Tries to harvest and steal browser information (history, passwords, etc) 17->95 28 cmd.exe 17->28         started        71 C:\Users\user\...\windowsdefenders.exe, PE32 22->71 dropped 31 cmd.exe 1 22->31         started        33 cmd.exe 1 22->33         started        file8 signatures9 process10 signatures11 109 Suspicious powershell command line found 28->109 35 powershell.exe 28->35         started        37 conhost.exe 28->37         started        111 Bypasses PowerShell execution policy 31->111 113 Uses schtasks.exe or at.exe to add and modify task schedules 31->113 39 conhost.exe 31->39         started        41 schtasks.exe 1 31->41         started        43 windowsdefenders.exe 2 33->43         started        46 conhost.exe 33->46         started        48 timeout.exe 1 33->48         started        process12 signatures13 50 sgkbcg.exe 35->50         started        103 Injects a PE file into a foreign processes 43->103 54 windowsdefenders.exe 43->54         started        process14 file15 73 C:\Users\user\AppData\...\dkENRzIGBDSCd.exe, PE32 50->73 dropped 75 C:\Users\user\AppData\Local\...\tmp7116.tmp, XML 50->75 dropped 97 Adds a directory exclusion to Windows Defender 50->97 99 Injects a PE file into a foreign processes 50->99 56 sgkbcg.exe 50->56         started        61 powershell.exe 50->61         started        63 schtasks.exe 50->63         started        signatures16 process17 dnsIp18 85 podzeye.duckdns.org 56->85 77 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 56->77 dropped 101 Hides that the sample has been downloaded from the Internet (zone.identifier) 56->101 65 conhost.exe 61->65         started        67 conhost.exe 63->67         started        file19 signatures20 process21
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-02-14 05:11:10 UTC
File Type:
PE (.Net Exe)
Extracted files:
21
AV detection:
17 of 27 (62.96%)
Threat level:
  5/5
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat botnet:default rat spyware stealer suricata
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Suspicious use of SetThreadContext
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Async RAT payload
AsyncRat
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
Malware Config
C2 Extraction:
podzeye.duckdns.org:2252
Unpacked files
SH256 hash:
421afb6d4fbad1fa7a598e98bc2a4fc3fe1bf8192b6b654384d79f1aded827b4
MD5 hash:
43f1b0511eb15e858bf21e186a9e8d89
SHA1 hash:
fa7be2d2ebb0b8e02954077e65d8913cc059a3ba
SH256 hash:
3ca74eb4ce4c2c5604dc298949ae47996d93063abfde0682d689205561d17d44
MD5 hash:
4e35b541f3d9162d0ac93d336df67779
SHA1 hash:
bb9e65761186806d4bada659e9d5db0c070501d4
SH256 hash:
48e59f3f928f0db0d4354d2a1bd104aecf4ef269e85cc5abbcb439e8c6a25cda
MD5 hash:
5f0b64fae2b9724c8b8322722c9256fb
SHA1 hash:
77053feb6a64c47f6a941f239d15c92e8c6249d9
SH256 hash:
cc47a68dbb8f6d50b592c422ad1d1669dd86f2cf927f99a1ac47e85471a371e4
MD5 hash:
6568a105378cfd5a4779c53b4f6e02bd
SHA1 hash:
6c3c2f1596fa63539fa9fed8fd637e967ba127e5
Detections:
win_asyncrat_w0
SH256 hash:
40c935ce8104afa8a498a4bde6146fb548e202370212ebbb7851ed443b3af510
MD5 hash:
afe82f228dc79fb9ba3f819ea237413a
SHA1 hash:
02745772a2fa58f222d16e70a190d3850b14d1a0
Malware family:
AsyncRAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments