MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 5d896a1e7acf19940db5d3dc02f125d84dddcdf8dfd344a87498d5fe157610a6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AsyncRAT
Vendor detections: 21
| SHA256 hash: | 5d896a1e7acf19940db5d3dc02f125d84dddcdf8dfd344a87498d5fe157610a6 |
|---|---|
| SHA3-384 hash: | f05b227472b661b8bd019795f38f71112ad3bf8bd31b5095ba0be0e66d10078cf5a8cda565953700b5ef8fc72cdca23e |
| SHA1 hash: | cf16b32b7282fc4ec565945f8043d70776058730 |
| MD5 hash: | 478a1956d73a21b08567fe4ee38b6da2 |
| humanhash: | neptune-river-finch-batman |
| File name: | Shieldbrowser.exe |
| Download: | download sample |
| Signature | AsyncRAT |
| File size: | 66'048 bytes |
| First seen: | 2026-01-10 15:36:24 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'797 x AgentTesla, 19'704 x Formbook, 12'277 x SnakeKeylogger) |
| ssdeep | 768:XhWBkc+d5iPpVei89J+X6BZrPym873tiHyYd1+DSCv7mqb2nSpwHsoFBhLO8G2iI:XUud+e5P8ZiHyYBGbbrwfG2iVclN |
| Threatray | 2'271 similar samples on MalwareBazaar |
| TLSH | T14C535B003798C965E2AD4AB4BCF2950106B5D5772102DB5E7CC405DBAB9EFC64A133FE |
| TrID | 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 9.7% (.EXE) Win64 Executable (generic) (10522/11/4) 6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 4.1% (.EXE) Win32 Executable (generic) (4504/4/1) |
| Magika | pebin |
| Reporter | Anonymous |
| Tags: | AsyncRAT botnet c2 exe |
Anonymous
The submitted sample Shieldbrowser.exe is a malicious Windows PE (.NET) executable impersonating a legitimate browser application. Static analysis via YARAify shows multiple high-confidence detections associated with AsyncRAT / DcRat malware families.The file matches numerous YARA rules including AcRat (AsyncRAT-based payload), AsyncRAT configuration decryption, DcRat variants, and generic multifamily RAT detections, indicating shared code lineage across AsyncRAT-derived threats. Additional detections highlight suspicious .NET behaviors such as AV enumeration, PowerShell/CMD usage, and known malicious imphash correlations.
ClamAV further classifies the sample as Win.Trojan.AsyncRAT, Zusy, and packed generic malware, suggesting obfuscation or packing to evade detection.
Overall, the evidence confirms this sample as a Remote Access Trojan (RAT) from the AsyncRAT/DcRat ecosystem, likely capable of remote control, system surveillance, and botnet-related activity.
Intelligence
File Origin
HKVendor Threat Intelligence
Details
Result
Behaviour
Malware Config
PORT: 80,443,1604,4444,5555,6606,6666,8080,8443
Result
Behaviour
Malware Config
hy7tpet.uk.com:8080
hy7tpet.uk.com:80
hy7tpet.uk.com:443
hy7tpet.uk.com:5555
hy7tpet.uk.com:1604
hy7tpet.uk.com:4444
hy7tpet.uk.com:6606
hy7tpet.uk.com:8443
www.hy7tpet.uk.com:6666
www.hy7tpet.uk.com:8080
www.hy7tpet.uk.com:80
www.hy7tpet.uk.com:443
www.hy7tpet.uk.com:5555
www.hy7tpet.uk.com:1604
www.hy7tpet.uk.com:4444
www.hy7tpet.uk.com:6606
www.hy7tpet.uk.com:8443
qen.uk.com:6666
qen.uk.com:8080
qen.uk.com:80
qen.uk.com:443
qen.uk.com:5555
qen.uk.com:1604
qen.uk.com:4444
qen.uk.com:6606
qen.uk.com:8443
www.qen.uk.com:6666
www.qen.uk.com:8080
www.qen.uk.com:80
www.qen.uk.com:443
www.qen.uk.com:5555
www.qen.uk.com:1604
www.qen.uk.com:4444
www.qen.uk.com:6606
www.qen.uk.com:8443
www.rcn.uk.com:6666
www.rcn.uk.com:8080
www.rcn.uk.com:80
www.rcn.uk.com:443
www.rcn.uk.com:5555
www.rcn.uk.com:1604
www.rcn.uk.com:4444
www.rcn.uk.com:6606
www.rcn.uk.com:8443
rcn.uk.com:6666
rcn.uk.com:8080
rcn.uk.com:80
rcn.uk.com:443
rcn.uk.com:5555
rcn.uk.com:1604
rcn.uk.com:4444
rcn.uk.com:6606
rcn.uk.com:8443
www.smileexpress.eu.com:6666
www.smileexpress.eu.com:8080
www.smileexpress.eu.com:80
www.smileexpress.eu.com:443
www.smileexpress.eu.com:5555
www.smileexpress.eu.com:1604
www.smileexpress.eu.com:4444
www.smileexpress.eu.com:6606
www.smileexpress.eu.com:8443
smileexpress.eu.com:6666
smileexpress.eu.com:8080
smileexpress.eu.com:80
smileexpress.eu.com:443
smileexpress.eu.com:5555
smileexpress.eu.com:1604
smileexpress.eu.com:4444
smileexpress.eu.com:6606
smileexpress.eu.com:8443
www.hrhsw.uk.com:6666
www.hrhsw.uk.com:8080
www.hrhsw.uk.com:80
www.hrhsw.uk.com:443
www.hrhsw.uk.com:5555
www.hrhsw.uk.com:1604
www.hrhsw.uk.com:4444
www.hrhsw.uk.com:6606
www.hrhsw.uk.com:8443
hrhsw.uk.com:6666
hrhsw.uk.com:8080
hrhsw.uk.com:80
hrhsw.uk.com:443
hrhsw.uk.com:5555
hrhsw.uk.com:1604
hrhsw.uk.com:4444
hrhsw.uk.com:6606
hrhsw.uk.com:8443
gti.uk.com:6666
gti.uk.com:8080
gti.uk.com:80
gti.uk.com:443
gti.uk.com:5555
gti.uk.com:1604
gti.uk.com:4444
gti.uk.com:6606
gti.uk.com:8443
www.gti.uk.com:6666
www.gti.uk.com:8080
www.gti.uk.com:80
www.gti.uk.com:443
www.gti.uk.com:5555
www.gti.uk.com:1604
www.gti.uk.com:4444
www.gti.uk.com:6606
www.gti.uk.com:8443
www.dug.uk.com:6666
www.dug.uk.com:8080
www.dug.uk.com:80
www.dug.uk.com:443
www.dug.uk.com:5555
www.dug.uk.com:1604
www.dug.uk.com:4444
www.dug.uk.com:6606
www.dug.uk.com:8443
dug.uk.com:6666
dug.uk.com:8080
dug.uk.com:80
dug.uk.com:443
dug.uk.com:5555
dug.uk.com:1604
dug.uk.com:4444
dug.uk.com:6606
dug.uk.com:8443
www.company-it-technology.ru.com:6666
www.company-it-technology.ru.com:8080
www.company-it-technology.ru.com:80
www.company-it-technology.ru.com:443
www.company-it-technology.ru.com:5555
www.company-it-technology.ru.com:1604
www.company-it-technology.ru.com:4444
www.company-it-technology.ru.com:6606
www.company-it-technology.ru.com:8443
company-it-technology.ru.com:6666
company-it-technology.ru.com:8080
company-it-technology.ru.com:80
company-it-technology.ru.com:443
company-it-technology.ru.com:5555
company-it-technology.ru.com:1604
company-it-technology.ru.com:4444
company-it-technology.ru.com:6606
company-it-technology.ru.com:8443
Unpacked files
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AcRat |
|---|---|
| Author: | Nikos 'n0t' Totosis |
| Description: | AcRat Payload (based on AsyncRat) |
| Rule name: | dcrat |
|---|---|
| Author: | jeFF0Falltrades |
| Rule name: | dcrat_kingrat |
|---|---|
| Author: | jeFF0Falltrades |
| Rule name: | dcrat_rkp |
|---|---|
| Author: | jeFF0Falltrades |
| Description: | Detects DCRat payloads |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_DcRatBy |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables containing the string DcRatBy |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables attemping to enumerate video devices using WMI |
| Rule name: | MAL_AsnycRAT |
|---|---|
| Author: | SECUINFRA Falcon Team |
| Description: | Detects AsnycRAT based on it's config decryption routine |
| Rule name: | MAL_AsyncRAT_Config_Decryption |
|---|---|
| Author: | SECUINFRA Falcon Team |
| Description: | Detects AsnycRAT based on it's config decryption routine |
| Rule name: | Mal_WIN_AsyncRat_RAT_PE |
|---|---|
| Author: | Phatcharadol Thangplub |
| Description: | Use to detect AsyncRAT implant. |
| Rule name: | Multifamily_RAT_Detection |
|---|---|
| Author: | Lucas Acha (http://www.lukeacha.com) |
| Description: | Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | Njrat |
|---|---|
| Author: | botherder https://github.com/botherder |
| Description: | Njrat |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | SUSP_DOTNET_PE_List_AV |
|---|---|
| Author: | SECUINFRA Falcon Team |
| Description: | Detecs .NET Binary that lists installed AVs |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| Rule name: | Windows_Generic_Threat_ce98c4bc |
|---|---|
| Author: | Elastic Security |
| Rule name: | win_asyncrat_unobfuscated |
|---|---|
| Author: | Matthew @ Embee_Research |
| Description: | Detects strings present in unobfuscated AsyncRat Samples. Rule may also pick up on other Asyncrat-derived malware (Dcrat/venom etc) |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.