MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5430f21e56324187cf6688c2dd6eedb9de703f4c72a8b8c4437154b371d2b37d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Arechclient2


Vendor detections: 12


Intelligence 12 IOCs YARA 6 File information Comments

SHA256 hash: 5430f21e56324187cf6688c2dd6eedb9de703f4c72a8b8c4437154b371d2b37d
SHA3-384 hash: 78ae66ce7ec51abbc4f31b7e47d1f05b4fb44761be962e1b0fb3d6cfb30b30eb8b2428249e865027e43bde13583e3a6c
SHA1 hash: 12c5b9b679b833fa481d309b458eaf49a8dfb195
MD5 hash: 043dbd1534e88b1a147337036c92bf07
humanhash: colorado-alpha-lithium-red
File name:ApplicationForm.lnk
Download: download sample
Signature Arechclient2
File size:2'473 bytes
First seen:2025-06-01 17:43:39 UTC
Last seen:2025-06-04 13:38:58 UTC
File type:Shortcut (lnk) lnk
MIME type:application/x-ms-shortcut
ssdeep 24:8Jwtn+wZ0KhtKWQWAlWI5bbeCxNPS9ddNXuHY8ddGRgGbvq+3Ym:8JC+wdQNRbbg9dLXuHJdGR/bvfY
Threatray 19 similar samples on MalwareBazaar
TLSH T1B7511F122BF50B19E3BB8B781577A350467BFE14AE08D70E1060460C18B2628D87AF3B
Magika lnk
Reporter abuse_ch
Tags:195-82-147-93 Arechclient2 lnk

Intelligence


File Origin
# of uploads :
3
# of downloads :
74
Origin country :
NL NL
Vendor Threat Intelligence
Verdict:
Malicious
Score:
94.9%
Tags:
xtreme shell sage
Result
Verdict:
Malicious
File Type:
LNK File - Malicious
Payload URLs
URL
File name
https://mogilux.com.br/wp-admin/tmp/huspecific.hta;
LNK File
Behaviour
BlacklistAPI detected
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
lolbin mshta powershell
Result
Threat name:
RedLine, SectopRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Attempt to bypass Chrome Application-Bound Encryption
Bypasses PowerShell execution policy
Connects to a pastebin service (likely for C&C)
Connects to many ports of the same IP (likely port scanning)
Creates HTA files
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Monitors registry run keys for changes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Powershell drops PE file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Invoke-WebRequest Execution
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Windows shortcut file (LNK) contains suspicious command line arguments
Windows shortcut file (LNK) starts blacklisted processes
Writes to foreign memory regions
Yara detected RedLine Stealer
Yara detected SectopRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1703479 Sample: ApplicationForm.lnk Startdate: 01/06/2025 Architecture: WINDOWS Score: 100 72 pastebin.com 2->72 74 mogilux.com.br 2->74 106 Suricata IDS alerts for network traffic 2->106 108 Malicious sample detected (through community Yara rule) 2->108 110 Windows shortcut file (LNK) starts blacklisted processes 2->110 114 14 other signatures 2->114 12 powershell.exe 14 20 2->12         started        17 msedge.exe 2->17         started        signatures3 112 Connects to a pastebin service (likely for C&C) 72->112 process4 dnsIp5 96 mogilux.com.br 192.185.216.146, 443, 49720 UNIFIEDLAYER-AS-1US United States 12->96 68 C:\Users\user\AppData\Local\Temp\1.hta, exported 12->68 dropped 136 Windows shortcut file (LNK) starts blacklisted processes 12->136 138 Creates HTA files 12->138 140 Powershell drops PE file 12->140 19 mshta.exe 1 12->19         started        22 conhost.exe 1 12->22         started        98 239.255.255.250 unknown Reserved 17->98 70 C:\Users\user\AppData\Local\...\Login Data, SQLite 17->70 dropped 24 msedge.exe 17->24         started        27 msedge.exe 17->27         started        29 msedge.exe 17->29         started        file6 signatures7 process8 dnsIp9 116 Windows shortcut file (LNK) starts blacklisted processes 19->116 118 Suspicious powershell command line found 19->118 120 Bypasses PowerShell execution policy 19->120 31 powershell.exe 49 19->31         started        78 ax-0001.ax-msedge.net 150.171.28.10, 443, 49873 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 24->78 80 ax-0002.ax-msedge.net 150.171.28.11, 443, 49861 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 24->80 82 19 other IPs or domains 24->82 signatures10 process11 dnsIp12 100 195.82.147.93, 49723, 80 DREAMTORRENT-CORP-ASRU Russian Federation 31->100 60 C:\Users\user\AppData\Local\Temp\...\jli.dll, PE32+ 31->60 dropped 62 C:\Users\user\AppData\...\husbandspecific.exe, PE32+ 31->62 dropped 64 C:\Users\...\api-ms-win-crt-string-l1-1-0.dll, PE32+ 31->64 dropped 66 10 other malicious files 31->66 dropped 102 Loading BitLocker PowerShell Module 31->102 36 husbandspecific.exe 1 31->36         started        39 conhost.exe 31->39         started        file13 signatures14 process15 signatures16 122 Writes to foreign memory regions 36->122 124 Allocates memory in foreign processes 36->124 126 Injects a PE file into a foreign processes 36->126 41 InstallUtil.exe 15 11 36->41         started        45 conhost.exe 36->45         started        47 AddInProcess32.exe 36->47         started        process17 dnsIp18 84 92.255.57.32, 15847 TELSPRU Russian Federation 41->84 86 45.141.84.229, 15847, 49727, 49728 MEDIALAND-ASRU Russian Federation 41->86 88 2 other IPs or domains 41->88 128 Attempt to bypass Chrome Application-Bound Encryption 41->128 130 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 41->130 132 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 41->132 134 2 other signatures 41->134 49 msedge.exe 41->49         started        52 chrome.exe 41->52         started        signatures19 process20 dnsIp21 104 Monitors registry run keys for changes 49->104 55 msedge.exe 49->55         started        76 192.168.2.4, 15847, 443, 49712 unknown unknown 52->76 57 chrome.exe 52->57         started        signatures22 process23 dnsIp24 90 www.google.com 142.250.114.103, 443, 49736, 49742 GOOGLEUS United States 57->90 92 play.google.com 142.250.115.138, 443, 49756 GOOGLEUS United States 57->92 94 3 other IPs or domains 57->94
Threat name:
Shortcut.Backdoor.Sectoprat
Status:
Malicious
First seen:
2025-05-31 19:49:41 UTC
File Type:
Binary
AV detection:
12 of 24 (50.00%)
Threat level:
  5/5
Result
Malware family:
sectoprat
Score:
  10/10
Tags:
family:sectoprat discovery execution rat trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Blocklisted process makes network request
Command and Scripting Interpreter: PowerShell
SectopRAT
SectopRAT payload
Sectoprat family
Malware family:
SectopRAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Detect_Remcos_RAT
Author:daniyyell
Description:Detects Remcos RAT payloads and commands
Rule name:Download_in_LNK
Author:@bartblaze
Description:Identifies download artefacts in shortcut (LNK) files.
Rule name:LNK_sospechosos
Author:Germán Fernández
Description:Detecta archivos .lnk sospechosos
Rule name:PS_in_LNK
Author:@bartblaze
Description:Identifies PowerShell artefacts in shortcut (LNK) files.
Rule name:Script_in_LNK
Author:@bartblaze
Description:Identifies scripting artefacts in shortcut (LNK) files.
Rule name:SUSP_LNK_PowerShell
Author:SECUINFRA Falcon Team
Description:Detects the reference to powershell inside an lnk file, which is suspicious

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Arechclient2

Shortcut (lnk) lnk 5430f21e56324187cf6688c2dd6eedb9de703f4c72a8b8c4437154b371d2b37d

(this sample)

  
Delivery method
Distributed via web download

Comments