MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 414a79e6c87489cb73e9176e867d554788a28ba86cb4e00f3f8fed15400999bd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 6


Intelligence 6 IOCs 1 YARA 6 File information Comments

SHA256 hash: 414a79e6c87489cb73e9176e867d554788a28ba86cb4e00f3f8fed15400999bd
SHA3-384 hash: 30d0be6fff047216c807a9dec2e3754b303fe5ac4bbc06b7f5a25201caa2aba9350b08cf8cf3e5e3a1349d092c0e5f2f
SHA1 hash: 6a9ac84f1c4778cf41ef45b2906919f99a06acf5
MD5 hash: eaecbd393f2fffd8522e5d4c7b8b6f7d
humanhash: jig-artist-emma-charlie
File name:W092.vbs
Download: download sample
Signature AsyncRAT
File size:1'595 bytes
First seen:2021-08-14 03:31:39 UTC
Last seen:2021-08-14 09:44:59 UTC
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 24:rEEPdqnWa9SNxJPpUI0I2rWGItUIZOIIIPITI3uFIJwIEIfILdgcjacdgcquU2bD:3tZx2Ahn1wE+FIzhg3Nz
Threatray 455 similar samples on MalwareBazaar
TLSH T1F4317E0870331993EA06D42231E731DDBD312748AABB8B71155EAA42AA409BF5C5CAB7
Reporter abuse_ch
Tags:AsyncRAT RAT vbs


Avatar
abuse_ch
AsyncRAT C2:
13.77.222.211:6890

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
13.77.222.211:6890 https://threatfox.abuse.ch/ioc/185760/

Intelligence


File Origin
# of uploads :
4
# of downloads :
157
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
60 / 100
Signature
Creates an undocumented autostart registry key
Sigma detected: CrackMapExec PowerShell Obfuscation
VBScript performs obfuscated calls to suspicious functions
Wscript starts Powershell (via cmd or directly)
Behaviour
Behavior Graph:
Result
Malware family:
Score:
  10/10
Tags:
family:asyncrat family:bitrat persistence rat suricata trojan upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Blocklisted process makes network request
UPX packed file
Async RAT payload
AsyncRat
BitRAT
BitRAT Payload
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
suricata: ET MALWARE Observed Malicious SSL Cert (BitRAT CnC)
Malware Config
C2 Extraction:
asyncpc.duckdns.org:6650
asyncpc.duckdns.org:9034
asyncpc.duckdns.org:6890
asyncpc.duckdns.org:7829
13.77.222.211:6650
13.77.222.211:9034
13.77.222.211:6890
13.77.222.211:7829
Dropper Extraction:
http://transfer.sh/1T8qkDx/ko.txt
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:asyncrat
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research
Rule name:INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse
Author:ditekSHen
Description:Detects file containing reversed ASEP Autorun registry keys
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:win_asyncrat_j1
Author:Johannes Bader @viql
Description:detects AsyncRAT
Rule name:win_asyncrat_w0
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments