MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7f21659ae9692d517b96389596eb7d11bb5ee7288968f8394085a53d27475bb8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 7f21659ae9692d517b96389596eb7d11bb5ee7288968f8394085a53d27475bb8
SHA3-384 hash: e8d359174f423fd5ed2acac203fb2214ef07a4b31ad6688d4daef636169c68a0c4d92ff9f6cebe93973d2920e0fadd4c
SHA1 hash: 461b06d8e6f2cace8ab6a0853f0b82cd81ce190a
MD5 hash: 62b6448d01bcdfb514a29a1d59b10bad
humanhash: high-fruit-artist-thirteen
File name:payload.bat
Download: download sample
Signature AsyncRAT
File size:143 bytes
First seen:2025-08-08 09:44:08 UTC
Last seen:Never
File type:Batch (bat) bat
MIME type:text/plain
ssdeep 3:VSJJFI9IrFh1RscfxHBAREC/EYtXiW8+zicU0dWIpTYfSNMFIKg4YH:s8qX5FORECMYtSomcU0MIpTlMFIzv
Threatray 343 similar samples on MalwareBazaar
TLSH T11CC08CE002A400AA095CC09F23BE0A432060F04891D9A25930B4C81251602BAB38A42C
Magika powershell
Reporter Neiki
Tags:AsyncRAT bat bknxmf-com ClickFix

Intelligence


File Origin
# of uploads :
1
# of downloads :
154
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
asyncrat
ID:
1
File name:
payload.bat
Verdict:
Malicious activity
Analysis date:
2025-08-08 09:37:24 UTC
Tags:
loader rat asyncrat remote auto-startup emmenhtal

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.9%
Tags:
autorun emotet
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
lolbin mshta powershell
Threat name:
Script-PowerShell.Trojan.Powdow
Status:
Malicious
First seen:
2025-08-08 09:37:24 UTC
File Type:
Text (PowerShell)
AV detection:
7 of 22 (31.82%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: PowerShell
Malware Config
Dropper Extraction:
http://bknxmf.com/
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments