MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 79b2feea1d26ddca465aaa01a7dbb7dd35aa2f111e09766a2eca88b35df1c747. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 7


Intelligence 7 IOCs YARA 9 File information Comments

SHA256 hash: 79b2feea1d26ddca465aaa01a7dbb7dd35aa2f111e09766a2eca88b35df1c747
SHA3-384 hash: 2bd0397f148431c387ad7fd703c9931779925468a6e43f04947d297910464de5ed8734c7b9d5578e377a9aa079382abf
SHA1 hash: cec7c017f93cb8eca302c5b9013304965a2a2a8f
MD5 hash: 80b1013a3e673f946936e221655d1eb8
humanhash: whiskey-october-oxygen-whiskey
File name:80b1013a3e673f946936e221655d1eb8.exe
Download: download sample
Signature AsyncRAT
File size:1'265'152 bytes
First seen:2021-10-05 13:01:45 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'648 x AgentTesla, 19'452 x Formbook, 12'201 x SnakeKeylogger)
ssdeep 24576:JDNvpbdp9/2f3Ky5Q41ORbwAHV+WWT86fDsU27fORAF7vwn:VvpTeywnQbwTtfi7uO7wn
Threatray 96 similar samples on MalwareBazaar
TLSH T1CE45121B265B511AC8206B75DEA3BB455B618FA7E4A3C692DE36331DC07E3367C0C386
File icon (PE):PE icon
dhash icon 71e888e8cce869b2 (7 x AsyncRAT, 2 x RemcosRAT, 1 x CoinMiner.XMRig)
Reporter abuse_ch
Tags:AsyncRAT exe RAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
222
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Launching a process
Creating a file in the %temp% directory
Creating a window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
obfuscated packed
Result
Threat name:
AsyncRAT
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Allocates memory in foreign processes
Creates autostart registry keys with suspicious names
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected AsyncRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 497223 Sample: VHp0AIIlQG.exe Startdate: 05/10/2021 Architecture: WINDOWS Score: 100 61 icacxndo.ac.ug 2->61 69 Multi AV Scanner detection for submitted file 2->69 71 Yara detected AsyncRAT 2->71 73 .NET source code contains potential unpacker 2->73 75 5 other signatures 2->75 9 VHp0AIIlQG.exe 4 6 2->9         started        13 dada.exe 2->13         started        15 dada.exe 2->15         started        signatures3 process4 file5 53 C:\Users\user\AppData\Roaming\dada.exe, PE32 9->53 dropped 55 C:\Users\user\AppData\Local\Temp\RegAsm.exe, PE32 9->55 dropped 57 C:\Users\user\...\dada.exe:Zone.Identifier, ASCII 9->57 dropped 59 2 other malicious files 9->59 dropped 77 Creates autostart registry keys with suspicious names 9->77 79 Writes to foreign memory regions 9->79 81 Allocates memory in foreign processes 9->81 17 wscript.exe 1 9->17         started        20 RegAsm.exe 2 9->20         started        23 powershell.exe 17 9->23         started        25 powershell.exe 16 9->25         started        83 Multi AV Scanner detection for dropped file 13->83 85 Machine Learning detection for dropped file 13->85 87 Injects a PE file into a foreign processes 13->87 27 powershell.exe 13->27         started        29 powershell.exe 13->29         started        31 RegAsm.exe 13->31         started        33 powershell.exe 15->33         started        35 2 other processes 15->35 signatures6 process7 dnsIp8 67 Wscript starts Powershell (via cmd or directly) 17->67 37 powershell.exe 24 17->37         started        63 icacxndo.ac.ug 194.5.98.107, 49752, 49753, 49797 DANILENKODE Netherlands 20->63 65 icando.ug 20->65 39 conhost.exe 23->39         started        41 conhost.exe 25->41         started        43 conhost.exe 27->43         started        45 conhost.exe 29->45         started        47 conhost.exe 33->47         started        49 conhost.exe 35->49         started        signatures9 process10 process11 51 conhost.exe 37->51         started       
Threat name:
ByteCode-MSIL.Downloader.Seraph
Status:
Malicious
First seen:
2021-10-05 13:02:12 UTC
AV detection:
19 of 45 (42.22%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
fb389239be3e8f950f50f68b5481eae5a3f54cd8a6c43e92e822b94fa2c4efc9
MD5 hash:
8525d3c871a55c1f6d78a173ac43aaa0
SHA1 hash:
e95ea246f5f42af6b9d51d46a6211f1f02d3c73d
SH256 hash:
a5ab8ab8c637012efd8ebf1636adf3edaddb39407b5dba5575a4b3dc306abbef
MD5 hash:
e45a5770c21fc44c10a939f6ba28f9cb
SHA1 hash:
e389843993a1fb774bbb9fb561b31f4174324297
SH256 hash:
0f5782935c9a6dc55a65f7bc782ff81b779f7d34d3177249600dd39a0cd122f1
MD5 hash:
722e3c478da1adffd516e9cfd329b761
SHA1 hash:
68a5ccf7d1d8f6a2e3608e678363ffb218a07ba9
SH256 hash:
79b2feea1d26ddca465aaa01a7dbb7dd35aa2f111e09766a2eca88b35df1c747
MD5 hash:
80b1013a3e673f946936e221655d1eb8
SHA1 hash:
cec7c017f93cb8eca302c5b9013304965a2a2a8f
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:asyncrat
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_zgRAT
Author:ditekSHen
Description:Detects zgRAT
Rule name:pe_imphash
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Typical_Malware_String_Transforms
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:Typical_Malware_String_Transforms_RID3473
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:win_asyncrat_w0
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AsyncRAT

Executable exe 79b2feea1d26ddca465aaa01a7dbb7dd35aa2f111e09766a2eca88b35df1c747

(this sample)

  
Delivery method
Distributed via web download

Comments