MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 812b683262522c802e012fece30087a0835e57502a0d2e55aeedb78a8fc715b8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 812b683262522c802e012fece30087a0835e57502a0d2e55aeedb78a8fc715b8
SHA3-384 hash: 26d78e70f3f3262c469f36ad41718137ea8757eddd564ea5414e638806abaa04cf211e9df44f73832a03eae49022047d
SHA1 hash: 747e5643a26bf64c58b76a478eb45bd58016afe3
MD5 hash: bdf985673d99c64473040aeaf4ba83cd
humanhash: juliet-cola-massachusetts-nine
File name:CV CREDENTIALS.rar
Download: download sample
Signature AsyncRAT
File size:404'304 bytes
First seen:2021-07-08 05:40:37 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 6144:FeGDEwTdh0lQgu5H4KMG+NRDc0YFLsuAhjG+mYY0Hm193ptVjE9LDznDx20OdMoF:FJIwTtMG+WR4pG+mh193ptyxnDx20nq
TLSH T17B84232649125473D0FE4C739E53A26DFA12725F680B912D1EF02D5D6EA6722CC333A7
Reporter cocaman
Tags:AsyncRAT rar


Avatar
cocaman
Malicious email (T1566.001)
From: "Muhammad Yaseen <qakhan@nrc.com.sa>" (likely spoofed)
Received: "from nrc.com.sa (unknown [103.155.81.50]) "
Date: "7 Jul 2021 20:15:37 -0700"
Subject: "Re: CV / Application for the post of Export Documentation and/or Operation Assistant / Pricing"
Attachment: "CV CREDENTIALS.rar"

Intelligence


File Origin
# of uploads :
1
# of downloads :
327
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Backdoor.Crysan
Status:
Malicious
First seen:
2021-07-08 03:58:43 UTC
File Type:
Binary (Archive)
Extracted files:
14
AV detection:
8 of 46 (17.39%)
Threat level:
  5/5
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat rat
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Loads dropped DLL
Executes dropped EXE
Async RAT payload
AsyncRat
Malware Config
C2 Extraction:
185.140.53.8:6060
ambiboss.ydns.eu:6060
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AsyncRAT

rar 812b683262522c802e012fece30087a0835e57502a0d2e55aeedb78a8fc715b8

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments