MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 7c3a49906e67a1928113554ff75f684ee54ab74abcf26ac1211d0cd8726cb086. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AsyncRAT
Vendor detections: 18
| SHA256 hash: | 7c3a49906e67a1928113554ff75f684ee54ab74abcf26ac1211d0cd8726cb086 |
|---|---|
| SHA3-384 hash: | 46b08df1f3bb6a0dd87523068346ae31750e7f63b2a1e159bf47c1d5fae864c674e1126f62704de251238c5f5cc96cf4 |
| SHA1 hash: | 6fb0977ab826a95321f0358d72f00bd20bd18444 |
| MD5 hash: | 6b0a269f871ce78deaf668565811283a |
| humanhash: | orange-apart-quiet-saturn |
| File name: | 7c3a49906e67a1928113554ff75f684ee54ab74abcf26ac1211d0cd8726cb086 |
| Download: | download sample |
| Signature | AsyncRAT |
| File size: | 3'369'984 bytes |
| First seen: | 2025-05-21 12:42:49 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'461 x Formbook, 12'202 x SnakeKeylogger) |
| ssdeep | 49152:7GHHBU+azKPKZ12ShzPMAzU0mdBdo+6WuDayPrr/NxJ:7UaOPHS9n |
| Threatray | 25 similar samples on MalwareBazaar |
| TLSH | T1EBF53B416BE8CE1BE1BF2775A4F201111BB1E449A732D78F1698E6792C637406D0A3BF |
| TrID | 44.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 25.0% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9) 9.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 6.3% (.EXE) Win64 Executable (generic) (10522/11/4) 3.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| Magika | pebin |
| Reporter | |
| Tags: | 67-217-228-160 AsyncRAT exe |
Intelligence
File Origin
ITVendor Threat Intelligence
Win.Packed.Adwarex-9851111-0
Win.Packed.Datastealer-9856291-0
Win.Malware.Generickdz-9865912-0
Win.Packed.Bulz-9891112-0
Win.Trojan.AsyncRAT-9914220-0
Win.Malware.Bulz-9916789-0
Win.Packed.AsyncRAT-9938103-1
Win.Malware.Bulz-9982456-0
Win.Packed.Msilzilla-10005487-0
Win.Packed.Tedy-10017583-0
Win.Malware.Zusy-10034587-0
ditekSHen.MALWARE.Win.Trojan.AsyncRAT.UNOFFICIAL
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AcRat |
|---|---|
| Author: | Nikos 'n0t' Totosis |
| Description: | AcRat Payload (based on AsyncRat) |
| Rule name: | DebuggerCheck__RemoteAPI |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | detect_powershell |
|---|---|
| Author: | daniyyell |
| Description: | Detects suspicious PowerShell activity related to malware execution |
| Rule name: | Detect_PowerShell_Obfuscation |
|---|---|
| Author: | daniyyell |
| Description: | Detects obfuscated PowerShell commands commonly used in malicious scripts. |
| Rule name: | Disable_Defender |
|---|---|
| Author: | iam-py-test |
| Description: | Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen |
| Rule name: | grakate_stealer_nov_2021 |
|---|
| Rule name: | INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs |
|---|---|
| Author: | ditekSHen |
| Description: | Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_B64_Artifacts |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables embedding bas64-encoded APIs, command lines, registry keys, etc. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_CC_Regex |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing credit card regular expressions |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Discord_Regex |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing Discord tokens regular expressions |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Windows executables referencing non-Windows User-Agents |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_VPN |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many VPN software clients. Observed in infosteslers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables embedding registry key / value combination indicative of disabling Windows Defender features |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing Windows vault credential objects. Observed in infostealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_WirelessNetReccon |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with interest in wireless interface using netsh |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables attemping to enumerate video devices using WMI |
| Rule name: | INDICATOR_SUSPICIOUS_References_SecTools |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many IR and analysis tools |
| Rule name: | Lumma_Stealer_Detection |
|---|---|
| Author: | ashizZz |
| Description: | Detects a specific Lumma Stealer malware sample using unique strings and behaviors |
| Reference: | https://seanthegeek.net/posts/compromized-store-spread-lumma-stealer-using-fake-captcha/ |
| Rule name: | Macos_Infostealer_Wallets_8e469ea0 |
|---|---|
| Author: | Elastic Security |
| Rule name: | MALWARE_Win_ArrowRAT |
|---|---|
| Author: | ditekSHen |
| Description: | Detects ArrowRAT |
| Rule name: | MALWARE_Win_AsyncRAT |
|---|---|
| Author: | ditekSHen |
| Description: | Detects AsyncRAT |
| Rule name: | MALWARE_Win_DLAgent10 |
|---|---|
| Author: | ditekSHen |
| Description: | Detects known downloader agent |
| Rule name: | MALWARE_Win_StormKitty |
|---|---|
| Author: | ditekSHen |
| Description: | Detects StormKitty infostealer |
| Rule name: | MALWARE_Win_VenomRAT |
|---|---|
| Author: | ditekSHen |
| Description: | Detects VenomRAT |
| Rule name: | Mal_WIN_AsyncRat_RAT_PE |
|---|---|
| Author: | Phatcharadol Thangplub |
| Description: | Use to detect AsyncRAT implant. |
| Rule name: | Multifamily_RAT_Detection |
|---|---|
| Author: | Lucas Acha (http://www.lukeacha.com) |
| Description: | Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | Njrat |
|---|---|
| Author: | botherder https://github.com/botherder |
| Description: | Njrat |
| Rule name: | pe_imphash |
|---|
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | ThreadControl__Context |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | venomrat |
|---|---|
| Author: | jeFF0Falltrades |
| Rule name: | Windows_Generic_Threat_21253888 |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Generic_Threat_2bb6f41d |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Generic_Threat_ce98c4bc |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_DCRat_1aeea1ac |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.RAT King Parser (https://github.com/jeFF0Falltrades/rat_king_parser) Output:
{
"sha256": "7c3a49906e67a1928113554ff75f684ee54ab74abcf26ac1211d0cd8726cb086",
"yara_possible_family": "venomrat",
"key": "d56a16c7baf00a4678a11b69ba25ce7fb839fe0c342f0ccd9d58f7fe56c33b4f",
"salt": "56656e6f6d524154427956656e6f6d",
"config": {
"Ports": [
"4449"
],
"Hosts": [
"67.217.228.160"
],
"Version": "RAT + hVNC 6.0.9",
"Install": "false",
"InstallFolder": "%AppData%",
"InstallFile": "Wihnup.exe",
"Key": "VXVkOGFuR3paNWZKdGhpOUI3MHNKZXN0UEVNY2xHc2M=",
"Mutex": "ehptevkbihupudouc",
"Certificate": "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",
"Serversignature": "JP816G18C7RYq1C9ei32dhQkJHyvTjLuVBgm1CJUESk114oGXNx0eW9uhL/kkXssSohFGFYX4Ya4Ycn3cqA0EzZKPaRWkU7rWWJOqYts9+OCxiCPTQunbSHf5KVMdw0cYXWZ7gnmwNzuA/2p3Ogr6/gD6YVrQCnQY4P30vnPWJQ=",
"Pastebin": "null",
"BSOD": "false",
"CISBLOCKING": "false",
"Hwid": "null",
"Delay": "1",
"Group": "Default",
"AntiProcess": "false",
"Anti": "false",
"EnableClipper": "false",
"ClipperBTC": "",
"ClipperETH": "",
"ClipperBCH": "",
"ClipperLTC": ""
}
}