MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7450d54f320aab5eceac8b80df6e7518b2ef891cb3b9669afc1b1422cbe8071a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 17


Intelligence 17 IOCs YARA 4 File information Comments

SHA256 hash: 7450d54f320aab5eceac8b80df6e7518b2ef891cb3b9669afc1b1422cbe8071a
SHA3-384 hash: 975eb254ce4b91eca6c755c1af590515882ee36b3cc6bc8f233d66b4cfde04f88274fad2efe6e72b0a7de4d29b0b1125
SHA1 hash: 805c61aad630258e052809cdde2589f3611e4c83
MD5 hash: 9c903c27f37aff133440d6823e868c16
humanhash: kitten-quebec-emma-violet
File name:SecuriteInfo.com.Win32.MalwareX-gen.94932894
Download: download sample
Signature AsyncRAT
File size:667'136 bytes
First seen:2026-03-25 20:35:52 UTC
Last seen:2026-03-25 21:21:15 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'853 x AgentTesla, 19'779 x Formbook, 12'304 x SnakeKeylogger)
ssdeep 12288:EBVhsoft5aCkYjULe/2DuVFs2vamV/7SqPb:EBV7V5avYZOaO2vaC/7JP
Threatray 16 similar samples on MalwareBazaar
TLSH T10CE4BE064D476B99DA7E0BB9C0630468BBF4C543A397E79F3FEC01F459A3B84CA25942
TrID 73.9% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
6.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.6% (.EXE) Win64 Executable (generic) (6522/11/2)
4.5% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter SecuriteInfoCom
Tags:AsyncRAT exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
141
Origin country :
FR FR
Vendor Threat Intelligence
Malware configuration found for:
DeepSea
Details
DeepSea
DeepSea decrypted strings
Malware family:
ID:
1
File name:
SecuriteInfo.com.Win32.MalwareX-gen.94932894
Verdict:
Malicious activity
Analysis date:
2026-03-25 20:38:03 UTC
Tags:
dcrat rat asyncrat remote darkcrystal

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Verdict:
Malicious
Score:
92.5%
Tags:
dotnet micro smtp
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connection attempt
Creating a window
Running batch commands
Launching a process
Creating a file
DNS request
Creating a file in the %AppData% directory
Creating a process from a recently created file
Unauthorized injection to a recently created process
Enabling autorun
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
crypt lolbin obfuscated obfuscated packed tracker vbnet
Result
Gathering data
Malware family:
Malicious Packer
Verdict:
Malicious
Gathering data
Threat name:
Win32.Trojan.Jalapeno
Status:
Malicious
First seen:
2026-03-25 20:36:22 UTC
File Type:
PE (.Net Exe)
Extracted files:
9
AV detection:
23 of 36 (63.89%)
Threat level:
  5/5
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat botnet:default adware discovery persistence rat spyware
Behaviour
Modifies Internet Explorer settings
Modifies registry class
Runs ping.exe
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Suspicious use of SetThreadContext
.NET Reactor proctector
Executes dropped EXE
AsyncRat
Asyncrat family
Modifies WinLogon for persistence
Malware Config
C2 Extraction:
e3zp8fgzvy.localto.net:5988
Unpacked files
SH256 hash:
7450d54f320aab5eceac8b80df6e7518b2ef891cb3b9669afc1b1422cbe8071a
MD5 hash:
9c903c27f37aff133440d6823e868c16
SHA1 hash:
805c61aad630258e052809cdde2589f3611e4c83
SH256 hash:
18bf646fad26a0aa1264cac867789c6d9f4de762bc83b9aeeff0f8d8d48ee6ac
MD5 hash:
4faf9d90e22fe6f5452ab806bb763ed7
SHA1 hash:
564455391f73d9d8f3baf3b907dfb9723f249820
SH256 hash:
0ed67121b9c5160d0c48f2aa28d9244df3024df2cab2175d8a5622f42564b900
MD5 hash:
baef8c5552c14966587b5ca5aa7817d8
SHA1 hash:
7604e32978e9102d1705b5033cbcd45cf0d9dc2f
Detections:
SUSP_NET_Large_Static_Array_In_Small_File_Jan24 win_asyncrat_unobfuscated INDICATOR_SUSPICIOUS_EXE_B64_Artifacts INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice INDICATOR_SUSPICIOUS_EXE_DcRatBy
SH256 hash:
69b83d39655ef00f775e5bc22b91874d629e68319550000343c581318fbe6fd4
MD5 hash:
b02d83e8ecf71c6399a3b3be638fb93b
SHA1 hash:
dfaff9ecb5aeab521334bf05aa7832d3d9af9451
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AsyncRAT

Executable exe 7450d54f320aab5eceac8b80df6e7518b2ef891cb3b9669afc1b1422cbe8071a

(this sample)

  
Delivery method
Distributed via web download

Comments