MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 74f095f2b5f575720fa634777740f4856468a0c008ba8e78b2d53738b205dc46. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 13


Intelligence 13 IOCs YARA 26 File information Comments

SHA256 hash: 74f095f2b5f575720fa634777740f4856468a0c008ba8e78b2d53738b205dc46
SHA3-384 hash: 12541abc5f961b3a229b9bb1b45a0e3d6460e0953661797bba5b9925803969e8fa5991abceb908ccb2e5061cbba9f158
SHA1 hash: d3c3deb7e8b7a747a46e38908413514e5c43c31d
MD5 hash: 2615cb5f93b2f8ee147afea62249f597
humanhash: one-paris-cola-finch
File name:test201.exe
Download: download sample
Signature AsyncRAT
File size:14'484'992 bytes
First seen:2026-03-01 18:10:47 UTC
Last seen:2026-03-01 18:27:38 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash ebc247a77b4d4a804b261f97a1fd075c (10 x Vidar, 10 x Smoke Loader, 2 x Stealc)
ssdeep 393216:FN/xstQ/ySftN5i2TgGOzzeKZC/MjT/a:FlxstQ/ySfv5i2REzeK
Threatray 12 similar samples on MalwareBazaar
TLSH T15AE6F08D9A1256E7D8AB6BB58C5183467295BD063FE5F7C33A2060241EB32DC5C3AFC1
TrID 33.1% (.EXE) Win64 Executable (generic) (6522/11/2)
25.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.4% (.ICL) Windows Icons Library (generic) (2059/9)
10.3% (.EXE) OS/2 Executable (generic) (2029/13)
10.1% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter BastianHein
Tags:AsyncRAT exe StormKitty

Intelligence


File Origin
# of uploads :
2
# of downloads :
133
Origin country :
CL CL
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
2026-03-01_2615cb5f93b2f8ee147afea62249f597_.exe
Verdict:
Malicious activity
Analysis date:
2026-03-01 18:01:06 UTC
Tags:
auto-reg xor-url generic golang stealer stormkitty

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
ransomware vmdetect dropper shell
Gathering data
Result
Gathering data
Verdict:
Malicious
File Type:
exe x64
Detections:
PDM:Trojan.Win32.Generic Trojan.Win32.PowerShell.nid
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
ByteCode-MSIL.Trojan.MereTam
Status:
Malicious
First seen:
2026-02-27 23:58:36 UTC
File Type:
PE+ (Exe)
Extracted files:
22
AV detection:
17 of 36 (47.22%)
Threat level:
  5/5
Result
Malware family:
stormkitty
Score:
  10/10
Tags:
family:asyncrat family:stormkitty discovery execution persistence rat stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Adds Run key to start application
Checks installed software on the system
Command and Scripting Interpreter: PowerShell
Async RAT payload
AsyncRat
Asyncrat family
StormKitty
StormKitty payload
Stormkitty family
Unpacked files
SH256 hash:
74f095f2b5f575720fa634777740f4856468a0c008ba8e78b2d53738b205dc46
MD5 hash:
2615cb5f93b2f8ee147afea62249f597
SHA1 hash:
d3c3deb7e8b7a747a46e38908413514e5c43c31d
SH256 hash:
58993ad17456b2e015298b297d7ed6d7cd5b53b5bdfb80c2f1f030bf842bfd6e
MD5 hash:
2703f668d6f98e17bdf47c77f1ae4d75
SHA1 hash:
e459e50a0ac38e64866f3eb9be635876ba12a44d
Detections:
AsyncRAT DiscordRatWebcamGrabber cn_utf8_windows_terminal INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_SUSPICIOUS_References_SecTools INDICATOR_SUSPICIOUS_EXE_B64_Artifacts INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA INDICATOR_SUSPICIOUS_EXE_CC_Regex INDICATOR_SUSPICIOUS_EXE_Discord_Regex INDICATOR_SUSPICIOUS_EXE_References_VPN INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID INDICATOR_SUSPICIOUS_EXE_WirelessNetReccon INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs MALWARE_Win_StormKitty MALWARE_Win_AsyncRAT MALWARE_Win_DLAgent10 MALWARE_Win_ArrowRAT MALWARE_Win_VenomRAT
SH256 hash:
e0bef7f04afe55b8d90261f6e64a6f7874dccf9f901080bd0c540e637c80f6dc
MD5 hash:
c58663d4b31ad34bbaa5f377b2ed27de
SHA1 hash:
a29976bcdc7366b1f30afc7280bbea05e42796c1
Detections:
MALWARE_Win_DLAgent10
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__ConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectGoMethodSignatures
Author:Wyatt Tauber
Description:Detects Go method signatures in unpacked Go binaries
Rule name:Detect_Go_GOMAXPROCS
Author:Obscurity Labs LLC
Description:Detects Go binaries by the presence of runtime.GOMAXPROCS in the runtime metadata
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:GoBinTest
Rule name:golang
Rule name:golang_binary_string
Description:Golang strings present
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:Golang_Find_CSC846
Author:Ashar Siddiqui
Description:Find Go Signatuers
Rule name:Golang_Find_CSC846_Simple
Author:Ashar Siddiqui
Description:Find Go Signatuers
Rule name:identity_golang
Author:Eric Yocam
Description:find Golang malware
Rule name:INDICATOR_TOOL_GoCLR
Author:ditekSHen
Description:Detects binaries utilizing Go-CLR for hosting the CLR in a Go process and using it to execute a DLL from disk or an assembly from memory
Rule name:ProgramLanguage_Golang
Author:albertzsigovits
Description:Application written in Golang programming language
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Suspicious_Golang_Binary
Author:Tim Machac
Description:Triage: Golang-compiled binary with suspicious OS/persistence/network strings (not family-specific)
Rule name:SUSP_XORed_Mozilla_Oct19
Author:Florian Roth
Description:Detects suspicious single byte XORed keyword 'Mozilla/5.0' - it uses yara's XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key.
Reference:https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force()
Rule name:SUSP_XORed_Mozilla_RID2DB4
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments