MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8482093d445f3d6acdd1b7943937d9d07dac4f23f610af03a7b35c8fc23e01e6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 8482093d445f3d6acdd1b7943937d9d07dac4f23f610af03a7b35c8fc23e01e6
SHA3-384 hash: 7f79a199d968019fb3f7947565a34314c3ded0cd3a43b07bc928261a16fe85497e646471cba2fb9950354a0324080d78
SHA1 hash: cdff9ad1dd30da7883bcb7f390feb132b89420b7
MD5 hash: d2f45041efa77aa7be84e35d440f233f
humanhash: low-east-winter-tennis
File name:dog.ps1
Download: download sample
Signature AsyncRAT
File size:256'209 bytes
First seen:2022-11-01 07:01:51 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 6144:pZZHUxxgQnQAUQP4wvsuJnUKZm4F3xd9jquHfoMYUEOiIpSsPt63yJARlLZnL5J7:XZaxgQnQzZ5JCFCcSQXE6jRKWGh
Threatray 5'358 similar samples on MalwareBazaar
TLSH T1D7443223BCDB25C62F0E6363EB03D681DC238DF67F94ACCD1887806966957075F85A86
Reporter ankit_anubhav
Tags:AsyncRAT ps1 TA558

Intelligence


File Origin
# of uploads :
1
# of downloads :
397
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Result
Threat name:
AsyncRAT, PhoenixRAT
Detection:
malicious
Classification:
troj.evad
Score:
96 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected AsyncRAT
Yara detected Generic Downloader
Yara detected PhoenixRAT
Behaviour
Behavior Graph:
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat botnet:g01p3 rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Async RAT payload
AsyncRat
Malware Config
C2 Extraction:
127.0.0.1:3313
127.0.0.1:3314
127.0.0.1:3315
127.0.0.1:9441
127.0.0.1:9442
127.0.0.1:9443
127.0.0.1:2900
127.0.0.1:2901
cdt2023.ddns.net:3313
cdt2023.ddns.net:3314
cdt2023.ddns.net:3315
cdt2023.ddns.net:9441
cdt2023.ddns.net:9442
cdt2023.ddns.net:9443
cdt2023.ddns.net:2900
cdt2023.ddns.net:2901
chromedata.webredirect.org:3313
chromedata.webredirect.org:3314
chromedata.webredirect.org:3315
chromedata.webredirect.org:9441
chromedata.webredirect.org:9442
chromedata.webredirect.org:9443
chromedata.webredirect.org:2900
chromedata.webredirect.org:2901
chromedata.accesscam.org:3313
chromedata.accesscam.org:3314
chromedata.accesscam.org:3315
chromedata.accesscam.org:9441
chromedata.accesscam.org:9442
chromedata.accesscam.org:9443
chromedata.accesscam.org:2900
chromedata.accesscam.org:2901
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments