MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4ed4aa642d67b79463edea71fa8781461cd6a63a4a01d20c497328801381a09a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 12


Intelligence 12 IOCs 2 YARA 2 File information Comments

SHA256 hash: 4ed4aa642d67b79463edea71fa8781461cd6a63a4a01d20c497328801381a09a
SHA3-384 hash: f5e9c1da47a9a510a5590f74e83f51d8e8d4989aab4d1c0682d305981baf459644c453bfcfb0ee69b9db9d8077f120f5
SHA1 hash: 0368343f5b768f81531fa402567434c89cccf814
MD5 hash: a6e4745f77d736bc7b275a3c427c085c
humanhash: eleven-pip-seventeen-edward
File name:a6e4745f77d736bc7b275a3c427c085c.exe
Download: download sample
Signature AsyncRAT
File size:231'936 bytes
First seen:2021-06-21 05:36:10 UTC
Last seen:2021-06-21 06:50:37 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'653 x AgentTesla, 19'464 x Formbook, 12'205 x SnakeKeylogger)
ssdeep 6144:rC3JtenEPUDGYD1ttSFISh/vj8DEeTBYL:r8IE3AtyljmF
Threatray 900 similar samples on MalwareBazaar
TLSH 6834F109D3CB9CD8F676D179D8B2D7113BF0F8849161CB5A786CD0923BA33923C6196A
Reporter abuse_ch
Tags:AsyncRAT exe RAT


Avatar
abuse_ch
AsyncRAT C2:
139.28.5.19:6606

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
139.28.5.19:6606 https://threatfox.abuse.ch/ioc/138009/
45.131.1.70:1604 https://threatfox.abuse.ch/ioc/138010/

Intelligence


File Origin
# of uploads :
2
# of downloads :
101
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Ruhsat1832689346PDF.exe
Verdict:
Malicious activity
Analysis date:
2021-06-19 10:07:03 UTC
Tags:
trojan rat asyncrat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
AsyncRAT
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Drops PE files with benign system names
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Protects its processes via BreakOnTermination flag
Sigma detected: Schedule system process
Sigma detected: Suspicious Svchost Process
Sigma detected: System File Execution Location Anomaly
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AsyncRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 437481 Sample: 41cX7Mna8v.exe Startdate: 21/06/2021 Architecture: WINDOWS Score: 100 87 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->87 89 Found malware configuration 2->89 91 Antivirus / Scanner detection for submitted sample 2->91 93 10 other signatures 2->93 9 41cX7Mna8v.exe 1 4 2->9         started        12 dllhost.exe 1 2->12         started        15 dllhost.exe 2->15         started        process3 file4 67 C:\Users\user\AppData\Roaming\...\dllhost.exe, PE32 9->67 dropped 69 C:\Users\user\...\dllhost.exe:Zone.Identifier, ASCII 9->69 dropped 71 C:\Users\user\AppData\...\41cX7Mna8v.exe.log, ASCII 9->71 dropped 17 41cX7Mna8v.exe 3 9->17         started        107 Antivirus detection for dropped file 12->107 109 Multi AV Scanner detection for dropped file 12->109 111 Machine Learning detection for dropped file 12->111 113 Injects a PE file into a foreign processes 12->113 20 dllhost.exe 1 12->20         started        22 dllhost.exe 12->22         started        24 dllhost.exe 15->24         started        signatures5 process6 file7 63 C:\Users\user\AppData\...\ASYNCCLIENT.EXE, PE32 17->63 dropped 65 C:\Users\user\AppData\Local\Temp\12346.EXE, PE32 17->65 dropped 26 ASYNCCLIENT.EXE 7 17->26         started        30 12346.EXE 2 17->30         started        33 ASYNCCLIENT.EXE 3 20->33         started        35 12346.EXE 3 20->35         started        37 12346.EXE 24->37         started        39 ASYNCCLIENT.EXE 24->39         started        process8 dnsIp9 73 C:\Users\user\AppData\Local\...\svchost.exe, PE32 26->73 dropped 75 C:\Users\user\AppData\...\tmpEAFC.tmp.bat, DOS 26->75 dropped 95 Antivirus detection for dropped file 26->95 97 Multi AV Scanner detection for dropped file 26->97 99 Protects its processes via BreakOnTermination flag 26->99 101 Drops PE files with benign system names 26->101 41 cmd.exe 26->41         started        43 cmd.exe 26->43         started        77 139.28.5.19, 49715, 7707 RADORETR Turkey 30->77 103 Machine Learning detection for dropped file 30->103 79 45.131.1.70, 1604, 49723 AS209737TR Turkey 33->79 46 cmd.exe 33->46         started        file10 signatures11 process12 signatures13 48 svchost.exe 41->48         started        51 conhost.exe 41->51         started        53 timeout.exe 41->53         started        105 Uses schtasks.exe or at.exe to add and modify task schedules 43->105 55 conhost.exe 43->55         started        57 schtasks.exe 43->57         started        59 conhost.exe 46->59         started        61 schtasks.exe 46->61         started        process14 signatures15 81 Antivirus detection for dropped file 48->81 83 Multi AV Scanner detection for dropped file 48->83 85 Machine Learning detection for dropped file 48->85
Threat name:
ByteCode-MSIL.Trojan.Wacatac
Status:
Malicious
First seen:
2021-06-19 14:48:47 UTC
File Type:
PE (.Net Exe)
Extracted files:
10
AV detection:
28 of 46 (60.87%)
Threat level:
  5/5
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat persistence rat
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
Async RAT payload
AsyncRat
Malware Config
C2 Extraction:
139.28.5.19:6606
139.28.5.19:7707
139.28.5.19:8808
45.131.1.70:1604
Unpacked files
SH256 hash:
325f7067648ad311eeeaabd7cb4336bd9eb887031267bc416de02d5439305154
MD5 hash:
4b559936315e30e7374f29153aed4d65
SHA1 hash:
ff2dcb741103e483776afc5c91e9a81671dd65ce
SH256 hash:
5797559c11865789bbac5488d0649bb93223c6043b900e167219c1da6d5a530c
MD5 hash:
fb98e42a396be1b4428650e53f7f441f
SHA1 hash:
f36fd462024a46d075d8488192e8b4b8b7a97105
Detections:
win_asyncrat_w0
SH256 hash:
e8ddb1d92edd468eef9352ded93b9c3e6e3d94062e89a6f022d77a486e3b51e7
MD5 hash:
ffef78dbf7d633d2f7f17e1fac2922b5
SHA1 hash:
e08339297e26aafeaadeb2a7bb22479cea3bac18
Detections:
win_asyncrat_w0
SH256 hash:
4ed4aa642d67b79463edea71fa8781461cd6a63a4a01d20c497328801381a09a
MD5 hash:
a6e4745f77d736bc7b275a3c427c085c
SHA1 hash:
0368343f5b768f81531fa402567434c89cccf814
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments