MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 436b62b367396313b45d402db522aaed95f7adb59e1b18bdad6747f9daf64fe9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 5


Intelligence 5 IOCs YARA 1 File information Comments

SHA256 hash: 436b62b367396313b45d402db522aaed95f7adb59e1b18bdad6747f9daf64fe9
SHA3-384 hash: 3572064b1a685a87e6ac328c1ad3d731a175393bf1de3e1d902e304fae288a3d6642d9c4271bb6015e674110e5dd61d4
SHA1 hash: 0999146c49fea3684fe61038284ba4bb54b99d52
MD5 hash: 76de0d8e43d59b3ee766a7b182dd7fdf
humanhash: sweet-glucose-harry-zebra
File name:436b62b367396313b45d402db522aaed95f7adb59e1b18bdad6747f9daf64fe9
Download: download sample
Signature AsyncRAT
File size:138'240 bytes
First seen:2020-06-10 09:49:45 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'602 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 3072:3M2eOdNiJpZRT7bvaWCQm7JhKk0jdEPblrbOsLQYhKTS613OWg5OhWq:cgNiJpZRT7bvLm7Jnrb1LbKTbgg
Threatray 96 similar samples on MalwareBazaar
TLSH C7D35B2033E98625E2FF8A78E4F126809BBAF657A513D74E0DD111DD1933BC18991FA3
Reporter JAMESWT_WT
Tags:AsyncRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
65
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
ByteCode-MSIL.Trojan.AntiWD
Status:
Malicious
First seen:
2020-06-04 15:16:09 UTC
File Type:
PE (.Net Exe)
Extracted files:
2
AV detection:
25 of 31 (80.65%)
Threat level:
  5/5
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat persistence rat
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Modifies service
Executes dropped EXE
Async RAT payload
AsyncRat
Contains code to disable Windows Defender
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_asyncrat_j1
Author:Johannes Bader @viql
Description:detects AsyncRAT

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments