MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 7b1b95a4e2b7ce6d451ed38ee70b0e085063d461e35d6cc156da845d026e9ff6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AsyncRAT
Vendor detections: 7
| SHA256 hash: | 7b1b95a4e2b7ce6d451ed38ee70b0e085063d461e35d6cc156da845d026e9ff6 |
|---|---|
| SHA3-384 hash: | 1ab8faaca21e13c5f3303056468c31d8538d76ba2890d75e02d8871fee0cb3fe07a59ea1a04a03478fe900ace67b4dd6 |
| SHA1 hash: | 9a96a3a349ce77ef3e4755c8211e227f690825b2 |
| MD5 hash: | b84d0d103a041346f8b537075535ab76 |
| humanhash: | oregon-vermont-muppet-friend |
| File name: | bin homebots io |
| Download: | download sample |
| Signature | AsyncRAT |
| File size: | 4'843'320 bytes |
| First seen: | 2024-09-08 06:32:32 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | text/x-msdos-batch |
| ssdeep | 49152:9GUJYQMgA4fVDKFsLHk2tZIivxRBjx60Gou5SGnvxfdXwouiSHQJHhKv4:O |
| TLSH | T12926024939497A992835EF7C3E1F500E26E887B1815513E0D7C3A79B8F2C909F8B52BD |
| Magika | txt |
| Reporter | |
| Tags: | AsyncRAT bat bin-homebots-io |
Intelligence
File Origin
# of uploads :
1
# of downloads :
109
Origin country :
ITVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
bin homebots io
Verdict:
No threats detected
Analysis date:
2024-09-08 06:41:40 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.9%
Tags:
Execution Network Stealth
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
cmd lolbin wmic
Result
Verdict:
UNKNOWN
Result
Threat name:
n/a
Detection:
malicious
Classification:
spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains process injector
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Found large BAT file
Found suspicious powershell code related to unpacking or dynamic code loading
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Obfuscated command line found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential WinAPI Calls Via CommandLine
Sigma detected: Potentially Suspicious Malware Callback Communication
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powerup Write Hijack DLL
Suricata IDS alerts for network traffic
Suspicious command line found
Suspicious execution chain found
Suspicious powershell command line found
Uses schtasks.exe or at.exe to add and modify task schedules
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Behaviour
Behavior Graph:
Score:
100%
Verdict:
Malware
File Type:
SCRIPT
Detection(s):
Suspicious file
Verdict:
unknown
Result
Malware family:
n/a
Score:
1/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
No further information available
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.