MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6ab6da6a16571db04901c0dcd2bf72d189159eb8a8c98e15caf28aadff57e492. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 8


Intelligence 8 IOCs YARA 2 File information Comments

SHA256 hash: 6ab6da6a16571db04901c0dcd2bf72d189159eb8a8c98e15caf28aadff57e492
SHA3-384 hash: 4759bb2bf1d4aa8329798535fb4573b07cf64d3062c576523da0bfc1e68e61557f5cc751b2c7b6c93c8064f0f654ad09
SHA1 hash: ea30945cb036c378fa47f2bba32154b2bd7e8337
MD5 hash: 069181a1c0719e0eae61a18bff71112b
humanhash: magnesium-nevada-equal-september
File name:Uni.bat
Download: download sample
Signature AsyncRAT
File size:10'879'444 bytes
First seen:2023-01-27 10:07:12 UTC
Last seen:Never
File type:Batch (bat) bat
MIME type:text/x-msdos-batch
ssdeep 49152:1biGz9El9Cu8sPJ/RZrU1cYS023/8AGMw/m+DYWy2OUBn662xR9P6qdult+cpPKJ:O
Threatray 4'007 similar samples on MalwareBazaar
TLSH T121B633125E5A7DAE8BBCD33C207F5E1E17914FC59458E5CA92C0A9CB2A1EF40191FC3A
Reporter r3dbU7z
Tags:AsyncRAT bat

Intelligence


File Origin
# of uploads :
1
# of downloads :
232
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Uni.bat
Verdict:
Malicious activity
Analysis date:
2023-01-27 10:07:30 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad.spyw
Score:
100 / 100
Signature
Bypasses PowerShell execution policy
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Drops executables to the windows directory (C:\Windows) and starts them
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Modifies the context of a thread in another process (thread injection)
Renames powershell.exe to bypass HIPS
Self deletion via cmd or bat file
Suspicious powershell command line found
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Very long command line found
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 792868 Sample: Uni.bat Startdate: 27/01/2023 Architecture: WINDOWS Score: 100 74 Suspicious powershell command line found 2->74 76 Very long command line found 2->76 78 Yara detected Costura Assembly Loader 2->78 10 cmd.exe 2 2->10         started        14 $sxr-powershell.exe 12 2->14         started        process3 file4 62 C:\Users\user\Desktop\Uni.bat.exe, PE32+ 10->62 dropped 94 Uses ping.exe to sleep 10->94 96 Uses ping.exe to check the status of other devices and networks 10->96 98 Renames powershell.exe to bypass HIPS 10->98 16 Uni.bat.exe 1 22 10->16         started        20 conhost.exe 10->20         started        22 conhost.exe 14->22         started        signatures5 process6 file7 54 C:\Windows\$sxr-powershell.exe, PE32+ 16->54 dropped 56 C:\Windows\System32\vcruntime140d.dll, PE32+ 16->56 dropped 58 C:\Windows\System32\vcruntime140_1d.dll, PE32+ 16->58 dropped 60 C:\Windows\System32\ucrtbased.dll, PE32+ 16->60 dropped 64 Suspicious powershell command line found 16->64 66 Very long command line found 16->66 68 Self deletion via cmd or bat file 16->68 70 7 other signatures 16->70 24 dllhost.exe 16->24         started        27 dllhost.exe 16->27         started        29 cmd.exe 16->29         started        31 2 other processes 16->31 signatures8 process9 signatures10 80 Injects code into the Windows Explorer (explorer.exe) 24->80 82 Writes to foreign memory regions 24->82 84 Creates a thread in another existing process (thread injection) 24->84 86 Injects a PE file into a foreign processes 24->86 33 lsass.exe 24->33 injected 36 winlogon.exe 24->36 injected 38 svchost.exe 24->38 injected 48 19 other processes 24->48 88 Found stalling execution ending in API Sleep call 27->88 90 Contains functionality to inject code into remote processes 27->90 92 Uses ping.exe to sleep 29->92 40 conhost.exe 29->40         started        42 PING.EXE 29->42         started        44 taskkill.exe 29->44         started        46 attrib.exe 29->46         started        process11 signatures12 72 Writes to foreign memory regions 33->72 50 MpCmdRun.exe 33->50         started        process13 process14 52 conhost.exe 50->52         started       
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Enumerates physical storage devices
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Loads dropped DLL
Executes dropped EXE
Suspicious use of NtCreateUserProcessOtherParentProcess
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:adonunix2
Author:Tim Brown @timb_machine
Description:AD on UNIX
Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AsyncRAT

Batch (bat) bat 6ab6da6a16571db04901c0dcd2bf72d189159eb8a8c98e15caf28aadff57e492

(this sample)

  
Delivery method
Distributed via web download

Comments