MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 75b28b1c5a969011567d3300a309043511de798a302a2424e0f1d3ad384b29de. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 9


Intelligence 9 IOCs YARA 5 File information Comments

SHA256 hash: 75b28b1c5a969011567d3300a309043511de798a302a2424e0f1d3ad384b29de
SHA3-384 hash: 2c9c89ceb5f08ed3f6ed1aee864cb333d4c5e66699aafc20f95eb80ef123cf703fca667bac4a8fcd701eed3f6f1c68e4
SHA1 hash: e86fd18d42cdd30981b8280e1cbc2a6ec5da89ba
MD5 hash: 828d274ba0b0e9158507692c6dcfb9f4
humanhash: butter-march-chicken-venus
File name:SCB_MT103_83638T2000028212_0534281.PDF.exe
Download: download sample
Signature AsyncRAT
File size:3'296'256 bytes
First seen:2020-10-16 12:51:57 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'606 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 49152:8tvQBS+O3WjHxYzwmL69Xy3sm4VESujJhOd:EQBW3WjRSh69uB8ESI
Threatray 1'304 similar samples on MalwareBazaar
TLSH 59E5D01B69C204E0D194AE35A7BC91FD22F06BAF0515A3BB119567F9DE2035F380B4BB
Reporter abuse_ch
Tags:AsyncRAT exe RAT


Avatar
abuse_ch
Malspam distributing AsyncRAT:

HELO: server.doklsa.us
Sending IP: 185.249.197.82
From: ITSC096 <itsc319@scb.co.th>
Subject: Receipt for Customer & MT103
Attachment: SCB_MT103_83638T2000028212_0534281.IMG (contains "SCB_MT103_83638T2000028212_0534281.PDF.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
75
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Creating a file in the %AppData% subdirectories
Launching cmd.exe command interpreter
Creating a process with a hidden window
Creating a process from a recently created file
Running batch commands
Launching a process
Creating a file
DNS request
Sending an HTTP GET request
Creating a file in the %temp% directory
Deleting a recently created file
Reading critical registry keys
Unauthorized injection to a recently created process
Stealing user critical data
Connection attempt to an infection source
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Threat name:
AsyncRAT MailPassView
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Allocates memory in foreign processes
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Uses an obfuscated file name to hide its real file extension (double extension)
Writes to foreign memory regions
Yara detected AntiVM_3
Yara detected AsyncRAT
Yara detected MailPassView
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 299260 Sample: SCB_MT103_83638T2000028212_... Startdate: 16/10/2020 Architecture: WINDOWS Score: 100 76 Multi AV Scanner detection for dropped file 2->76 78 Multi AV Scanner detection for submitted file 2->78 80 Yara detected MailPassView 2->80 82 9 other signatures 2->82 10 SCB_MT103_83638T2000028212_0534281.PDF.exe 5 2->10         started        14 kitd.exe 2->14         started        process3 file4 66 C:\Users\user\AppData\Roaming\...\docp12.exe, PE32 10->66 dropped 68 SCB_MT103_83638T20...0534281.PDF.exe.log, ASCII 10->68 dropped 94 Hides that the sample has been downloaded from the Internet (zone.identifier) 10->94 16 cmd.exe 1 10->16         started        18 cmd.exe 1 10->18         started        20 cmd.exe 2 10->20         started        96 Writes to foreign memory regions 14->96 98 Allocates memory in foreign processes 14->98 100 Injects a PE file into a foreign processes 14->100 23 InstallUtil.exe 14->23         started        signatures5 process6 file7 25 docp12.exe 3 16->25         started        28 conhost.exe 16->28         started        30 kitd.exe 5 18->30         started        32 conhost.exe 18->32         started        56 C:\Users\user\AppData\Roaming\...\kitd.exe, PE32 20->56 dropped 34 conhost.exe 20->34         started        process8 signatures9 84 Hides that the sample has been downloaded from the Internet (zone.identifier) 25->84 36 mscorsvw.exe 17 25->36         started        86 Multi AV Scanner detection for dropped file 30->86 88 Writes to foreign memory regions 30->88 90 Allocates memory in foreign processes 30->90 92 Injects a PE file into a foreign processes 30->92 40 InstallUtil.exe 30->40         started        process10 dnsIp11 70 josepv.getenjoyment.net 185.176.43.102, 49732, 49739, 80 ZETTA-ASBG Bulgaria 36->70 58 C:\Users\user\AppData\Local\Temp\B.exe, PE32 36->58 dropped 60 C:\Users\user\AppData\Local\Temp\A.exe, PE32 36->60 dropped 62 C:\Users\user\AppData\Local\...\A[1], PE32 36->62 dropped 64 C:\Users\user\AppData\Local\...\B[1], PE32 36->64 dropped 42 cmd.exe 1 36->42         started        44 cmd.exe 36->44         started        72 185.244.30.121, 49745, 49747, 49748 DAVID_CRAIGGG Netherlands 40->72 file12 process13 process14 46 A.exe 13 42->46         started        50 conhost.exe 42->50         started        52 B.exe 44->52         started        54 conhost.exe 44->54         started        dnsIp15 74 192.168.2.1 unknown unknown 46->74 102 Multi AV Scanner detection for dropped file 46->102 104 Machine Learning detection for dropped file 46->104 106 Tries to harvest and steal browser information (history, passwords, etc) 46->106 108 Tries to steal Instant Messenger accounts or passwords 52->108 110 Tries to steal Mail credentials (via file access) 52->110 signatures16
Threat name:
ByteCode-MSIL.Backdoor.Crysan
Status:
Malicious
First seen:
2020-10-16 07:20:06 UTC
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
rat spyware family:asyncrat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Async RAT payload
AsyncRat
Malware Config
C2 Extraction:
185.244.30.121:7882
Unpacked files
SH256 hash:
75b28b1c5a969011567d3300a309043511de798a302a2424e0f1d3ad384b29de
MD5 hash:
828d274ba0b0e9158507692c6dcfb9f4
SHA1 hash:
e86fd18d42cdd30981b8280e1cbc2a6ec5da89ba
SH256 hash:
09fd96deec0d86581e8ad886431f43efae23cc847d22864c9add891657c92414
MD5 hash:
0d62f9b7c936d92e726caf907f45ef0b
SHA1 hash:
2adfc4cf1e575a9704bc5fe5fdf4d4fabdc2d0ed
SH256 hash:
4f690f3cf792f24a571f09740cf25d0979bde8c11180a26864056643c30479cd
MD5 hash:
304cc4a1948539064cfec5b70bd83e21
SHA1 hash:
32b3754f52323fd71b8349f01c9dd4bc4fecd880
SH256 hash:
f9c341679423a3ac010b7da292ab6d1ef0ae7e995cd085ada95e1384ba3af38c
MD5 hash:
b1c72a8e99542c64507470535686ddd9
SHA1 hash:
fe3bec4b6e2b7091db68705feb59090c24c8b6ed
SH256 hash:
ac887f792c4ecb76377f08cf3850433687ac4a15d8d943907fc884c211766207
MD5 hash:
02d74db3070316bd575a625bf101a840
SHA1 hash:
657a194df3e4288d6446166196f0573a4784ad55
SH256 hash:
9790a6aa3d28d77d320c8f32938122c1212b7f6291daa7511f854a3fcd0fb037
MD5 hash:
6e53bc3c0364eefd1d448d25e026975d
SHA1 hash:
f11ea87b0638531f442b113feb19dbaae81ad518
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:asyncrat
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research
Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE).
Rule name:Reverse_text_bin_mem
Author:James_inthe_box
Description:Reverse text detected
Rule name:win_asyncrat_j1
Author:Johannes Bader @viql
Description:detects AsyncRAT
Rule name:win_asyncrat_w0
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AsyncRAT

Executable exe 75b28b1c5a969011567d3300a309043511de798a302a2424e0f1d3ad384b29de

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments