MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 851afa6f3343202f7cf017e1b4e7ada2063132ad3e726c26fc33e1d657e24586. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 22


Intelligence 22 IOCs YARA 18 File information Comments

SHA256 hash: 851afa6f3343202f7cf017e1b4e7ada2063132ad3e726c26fc33e1d657e24586
SHA3-384 hash: 29bc804b9298ccc855c0e5f3ae83559df16c1929164fe7d24879ebefb8ba9cfcfe2d52c89c648fbfe07ffbcd73c4cde2
SHA1 hash: 27d76724dbb48bf181ee956d130ecdaa144ee33c
MD5 hash: bba1a19f6d2c846b3d09505e5d9838be
humanhash: lake-chicken-pennsylvania-missouri
File name:winrar.exe
Download: download sample
Signature AsyncRAT
File size:140'288 bytes
First seen:2026-01-06 18:44:38 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'747 x AgentTesla, 19'642 x Formbook, 12'245 x SnakeKeylogger)
ssdeep 3072:gQQxBU4Uxv1AVEeGbb//1U9BeF+YzB1hXeiYY0I26QqxqY:gOzwkb3wBeYA/mIBpk
Threatray 2'819 similar samples on MalwareBazaar
TLSH T194D3C0052B48C8A1E2AD4AB8DDF2564046B5CDB32501DA0E7CC425CF67AEFC95A077FE
TrID 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.7% (.EXE) Win64 Executable (generic) (10522/11/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.1% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter ame221a
Tags:AsyncRAT c2 DCRat exe trojan


Avatar
ame221a
AsyncRAT (also written AsyncRAT) is a malicious Remote Access Trojan (RAT) written in C# (.NET) that allows attackers to remotely control infected Windows systems.

It is open source, highly configurable, and widely abused in real-world cybercrime, making it one of the most common RATs seen in modern botnet campaigns.

Intelligence


File Origin
# of uploads :
1
# of downloads :
142
Origin country :
ES ES
Vendor Threat Intelligence
Malware configuration found for:
DcRat PostExploitTool
Details
DcRat
c2 socket addresses, a version, a mutex, an SSL certificate and server signature, an interval, varying flags, and possibly a filepath and a group
Malware family:
asyncrat
ID:
1
File name:
_851afa6f3343202f7cf017e1b4e7ada2063132ad3e726c26fc33e1d657e24586.exe
Verdict:
Malicious activity
Analysis date:
2026-01-06 19:09:08 UTC
Tags:
auto-reg asyncrat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
asyncrat autorun
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Creating a file in the %AppData% directory
Creating a file in the %temp% directory
Creating a file
Launching a process
Sending a custom TCP request
Creating a process from a recently created file
DNS request
Connection attempt
Unauthorized injection to a recently created process
Enabling autorun by creating a file
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug anti-vm asyncrat base64 configsecuritypolicy evasive fingerprint hacktool lolbin mpcmdrun msconfig packed razy reconnaissance regedit schtasks vbnet
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-01-06T16:15:00Z UTC
Last seen:
2026-01-07T06:26:00Z UTC
Hits:
~100
Detections:
HEUR:Trojan-PSW.MSIL.Agent.gen HEUR:Trojan.MSIL.Agent.gen HEUR:Backdoor.MSIL.SheetRat.gen Backdoor.MSIL.Crysan.d PDM:Trojan.Win32.Tasker.cust Trojan.MSIL.DInvoke.sb HEUR:Backdoor.MSIL.DcRat.gen Backdoor.MSIL.Darkrat.sb Backdoor.MSIL.Crysan.sb PDM:Trojan.Win32.Generic
Verdict:
njRat
YARA:
14 match(es)
Tags:
.Net DarkCrystal RAT DcRat Executable Managed .NET njRat PE (Portable Executable) PE File Layout RAT SOS: 0.25 Win 32 Exe x86
Malware Config
C2 Extraction:
CNC: motfim.com,1710.cn.com,8xx.de.com,vxe.uk.com,buybitcoin.us.com,777x.us.com,runafrica.us.org,n188.co.com,todayepisode.ru.com,exuberant.uk.com,735bet12.com,eihbgb.sa.com,gate.motfim.com,gate.1710.cn.com,gate.8xx.de.com,gate.vxe.uk.com,gate.buybitcoin.us.com,gate.777x.us.com,gate.runafrica.us.org,gate.n188.co.com,gate.todayepisode.ru.com,gate.exuberant.uk.com,gate.735bet12.com,gate.eihbgb.sa.com,www.motfim.com,www.1710.cn.com,www.8xx.de.com,www.vxe.uk.com,www.buybitcoin.us.com,www.777x.us.com,www.runafrica.us.org,www.n188.co.com,www.todayepisode.ru.com,www.exuberant.uk.com,www.735bet12.com,www.eihbgb.sa.com
PORT: 80,443,2053,2083,2087,2096,4782,8080,8848,8888
Threat name:
ByteCode-MSIL.Backdoor.AsyncRAT
Status:
Malicious
First seen:
2026-01-06 18:45:25 UTC
File Type:
PE (.Net Exe)
Extracted files:
14
AV detection:
23 of 24 (95.83%)
Threat level:
  5/5
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat botnet:horizon defense_evasion execution persistence rat
Behaviour
Delays execution with timeout.exe
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Checks computer location settings
Executes dropped EXE
Async RAT payload
AsyncRat
Asyncrat family
Malware Config
C2 Extraction:
motfim.com:8848
motfim.com:443
motfim.com:8080
motfim.com:80
motfim.com:8888
motfim.com:2053
motfim.com:2083
motfim.com:2087
motfim.com:2096
motfim.com:4782
1710.cn.com:8848
1710.cn.com:443
1710.cn.com:8080
1710.cn.com:80
1710.cn.com:8888
1710.cn.com:2053
1710.cn.com:2083
1710.cn.com:2087
1710.cn.com:2096
1710.cn.com:4782
8xx.de.com:8848
8xx.de.com:443
8xx.de.com:8080
8xx.de.com:80
8xx.de.com:8888
8xx.de.com:2053
8xx.de.com:2083
8xx.de.com:2087
8xx.de.com:2096
8xx.de.com:4782
vxe.uk.com:8848
vxe.uk.com:443
vxe.uk.com:8080
vxe.uk.com:80
vxe.uk.com:8888
vxe.uk.com:2053
vxe.uk.com:2083
vxe.uk.com:2087
vxe.uk.com:2096
vxe.uk.com:4782
buybitcoin.us.com:8848
buybitcoin.us.com:443
buybitcoin.us.com:8080
buybitcoin.us.com:80
buybitcoin.us.com:8888
buybitcoin.us.com:2053
buybitcoin.us.com:2083
buybitcoin.us.com:2087
buybitcoin.us.com:2096
buybitcoin.us.com:4782
777x.us.com:8848
777x.us.com:443
777x.us.com:8080
777x.us.com:80
777x.us.com:8888
777x.us.com:2053
777x.us.com:2083
777x.us.com:2087
777x.us.com:2096
777x.us.com:4782
runafrica.us.org:8848
runafrica.us.org:443
runafrica.us.org:8080
runafrica.us.org:80
runafrica.us.org:8888
runafrica.us.org:2053
runafrica.us.org:2083
runafrica.us.org:2087
runafrica.us.org:2096
runafrica.us.org:4782
n188.co.com:8848
n188.co.com:443
n188.co.com:8080
n188.co.com:80
n188.co.com:8888
n188.co.com:2053
n188.co.com:2083
n188.co.com:2087
n188.co.com:2096
n188.co.com:4782
todayepisode.ru.com:8848
todayepisode.ru.com:443
todayepisode.ru.com:8080
todayepisode.ru.com:80
todayepisode.ru.com:8888
todayepisode.ru.com:2053
todayepisode.ru.com:2083
todayepisode.ru.com:2087
todayepisode.ru.com:2096
todayepisode.ru.com:4782
exuberant.uk.com:8848
exuberant.uk.com:443
exuberant.uk.com:8080
exuberant.uk.com:80
exuberant.uk.com:8888
exuberant.uk.com:2053
exuberant.uk.com:2083
exuberant.uk.com:2087
exuberant.uk.com:2096
exuberant.uk.com:4782
735bet12.com:8848
735bet12.com:443
735bet12.com:8080
735bet12.com:80
735bet12.com:8888
735bet12.com:2053
735bet12.com:2083
735bet12.com:2087
735bet12.com:2096
735bet12.com:4782
eihbgb.sa.com:8848
eihbgb.sa.com:443
eihbgb.sa.com:8080
eihbgb.sa.com:80
eihbgb.sa.com:8888
eihbgb.sa.com:2053
eihbgb.sa.com:2083
eihbgb.sa.com:2087
eihbgb.sa.com:2096
eihbgb.sa.com:4782
gate.motfim.com:8848
gate.motfim.com:443
gate.motfim.com:8080
gate.motfim.com:80
gate.motfim.com:8888
gate.motfim.com:2053
gate.motfim.com:2083
gate.motfim.com:2087
gate.motfim.com:2096
gate.motfim.com:4782
gate.1710.cn.com:8848
gate.1710.cn.com:443
gate.1710.cn.com:8080
gate.1710.cn.com:80
gate.1710.cn.com:8888
gate.1710.cn.com:2053
gate.1710.cn.com:2083
gate.1710.cn.com:2087
gate.1710.cn.com:2096
gate.1710.cn.com:4782
gate.8xx.de.com:8848
gate.8xx.de.com:443
gate.8xx.de.com:8080
gate.8xx.de.com:80
gate.8xx.de.com:8888
gate.8xx.de.com:2053
gate.8xx.de.com:2083
gate.8xx.de.com:2087
gate.8xx.de.com:2096
gate.8xx.de.com:4782
gate.vxe.uk.com:8848
gate.vxe.uk.com:443
gate.vxe.uk.com:8080
gate.vxe.uk.com:80
gate.vxe.uk.com:8888
gate.vxe.uk.com:2053
gate.vxe.uk.com:2083
gate.vxe.uk.com:2087
gate.vxe.uk.com:2096
gate.vxe.uk.com:4782
gate.buybitcoin.us.com:8848
gate.buybitcoin.us.com:443
gate.buybitcoin.us.com:8080
gate.buybitcoin.us.com:80
gate.buybitcoin.us.com:8888
gate.buybitcoin.us.com:2053
gate.buybitcoin.us.com:2083
gate.buybitcoin.us.com:2087
gate.buybitcoin.us.com:2096
gate.buybitcoin.us.com:4782
gate.777x.us.com:8848
gate.777x.us.com:443
gate.777x.us.com:8080
gate.777x.us.com:80
gate.777x.us.com:8888
gate.777x.us.com:2053
gate.777x.us.com:2083
gate.777x.us.com:2087
gate.777x.us.com:2096
gate.777x.us.com:4782
gate.runafrica.us.org:8848
gate.runafrica.us.org:443
gate.runafrica.us.org:8080
gate.runafrica.us.org:80
gate.runafrica.us.org:8888
gate.runafrica.us.org:2053
gate.runafrica.us.org:2083
gate.runafrica.us.org:2087
gate.runafrica.us.org:2096
gate.runafrica.us.org:4782
gate.n188.co.com:8848
gate.n188.co.com:443
gate.n188.co.com:8080
gate.n188.co.com:80
gate.n188.co.com:8888
gate.n188.co.com:2053
gate.n188.co.com:2083
gate.n188.co.com:2087
gate.n188.co.com:2096
gate.n188.co.com:4782
gate.todayepisode.ru.com:8848
gate.todayepisode.ru.com:443
gate.todayepisode.ru.com:8080
gate.todayepisode.ru.com:80
gate.todayepisode.ru.com:8888
gate.todayepisode.ru.com:2053
gate.todayepisode.ru.com:2083
gate.todayepisode.ru.com:2087
gate.todayepisode.ru.com:2096
gate.todayepisode.ru.com:4782
gate.exuberant.uk.com:8848
gate.exuberant.uk.com:443
gate.exuberant.uk.com:8080
gate.exuberant.uk.com:80
gate.exuberant.uk.com:8888
gate.exuberant.uk.com:2053
gate.exuberant.uk.com:2083
gate.exuberant.uk.com:2087
gate.exuberant.uk.com:2096
gate.exuberant.uk.com:4782
gate.735bet12.com:8848
gate.735bet12.com:443
gate.735bet12.com:8080
gate.735bet12.com:80
gate.735bet12.com:8888
gate.735bet12.com:2053
gate.735bet12.com:2083
gate.735bet12.com:2087
gate.735bet12.com:2096
gate.735bet12.com:4782
gate.eihbgb.sa.com:8848
gate.eihbgb.sa.com:443
gate.eihbgb.sa.com:8080
gate.eihbgb.sa.com:80
gate.eihbgb.sa.com:8888
gate.eihbgb.sa.com:2053
gate.eihbgb.sa.com:2083
gate.eihbgb.sa.com:2087
gate.eihbgb.sa.com:2096
gate.eihbgb.sa.com:4782
www.motfim.com:8848
www.motfim.com:443
www.motfim.com:8080
www.motfim.com:80
www.motfim.com:8888
www.motfim.com:2053
www.motfim.com:2083
www.motfim.com:2087
www.motfim.com:2096
www.motfim.com:4782
www.1710.cn.com:8848
www.1710.cn.com:443
www.1710.cn.com:8080
www.1710.cn.com:80
www.1710.cn.com:8888
www.1710.cn.com:2053
www.1710.cn.com:2083
www.1710.cn.com:2087
www.1710.cn.com:2096
www.1710.cn.com:4782
www.8xx.de.com:8848
www.8xx.de.com:443
www.8xx.de.com:8080
www.8xx.de.com:80
www.8xx.de.com:8888
www.8xx.de.com:2053
www.8xx.de.com:2083
www.8xx.de.com:2087
www.8xx.de.com:2096
www.8xx.de.com:4782
www.vxe.uk.com:8848
www.vxe.uk.com:443
www.vxe.uk.com:8080
www.vxe.uk.com:80
www.vxe.uk.com:8888
www.vxe.uk.com:2053
www.vxe.uk.com:2083
www.vxe.uk.com:2087
www.vxe.uk.com:2096
www.vxe.uk.com:4782
www.buybitcoin.us.com:8848
www.buybitcoin.us.com:443
www.buybitcoin.us.com:8080
www.buybitcoin.us.com:80
www.buybitcoin.us.com:8888
www.buybitcoin.us.com:2053
www.buybitcoin.us.com:2083
www.buybitcoin.us.com:2087
www.buybitcoin.us.com:2096
www.buybitcoin.us.com:4782
www.777x.us.com:8848
www.777x.us.com:443
www.777x.us.com:8080
www.777x.us.com:80
www.777x.us.com:8888
www.777x.us.com:2053
www.777x.us.com:2083
www.777x.us.com:2087
www.777x.us.com:2096
www.777x.us.com:4782
www.runafrica.us.org:8848
www.runafrica.us.org:443
www.runafrica.us.org:8080
www.runafrica.us.org:80
www.runafrica.us.org:8888
www.runafrica.us.org:2053
www.runafrica.us.org:2083
www.runafrica.us.org:2087
www.runafrica.us.org:2096
www.runafrica.us.org:4782
www.n188.co.com:8848
www.n188.co.com:443
www.n188.co.com:8080
www.n188.co.com:80
www.n188.co.com:8888
www.n188.co.com:2053
www.n188.co.com:2083
www.n188.co.com:2087
www.n188.co.com:2096
www.n188.co.com:4782
www.todayepisode.ru.com:8848
www.todayepisode.ru.com:443
www.todayepisode.ru.com:8080
www.todayepisode.ru.com:80
www.todayepisode.ru.com:8888
www.todayepisode.ru.com:2053
www.todayepisode.ru.com:2083
www.todayepisode.ru.com:2087
www.todayepisode.ru.com:2096
www.todayepisode.ru.com:4782
www.exuberant.uk.com:8848
www.exuberant.uk.com:443
www.exuberant.uk.com:8080
www.exuberant.uk.com:80
www.exuberant.uk.com:8888
www.exuberant.uk.com:2053
www.exuberant.uk.com:2083
www.exuberant.uk.com:2087
www.exuberant.uk.com:2096
www.exuberant.uk.com:4782
www.735bet12.com:8848
www.735bet12.com:443
www.735bet12.com:8080
www.735bet12.com:80
www.735bet12.com:8888
www.735bet12.com:2053
www.735bet12.com:2083
www.735bet12.com:2087
www.735bet12.com:2096
www.735bet12.com:4782
www.eihbgb.sa.com:8848
www.eihbgb.sa.com:443
www.eihbgb.sa.com:8080
www.eihbgb.sa.com:80
www.eihbgb.sa.com:8888
www.eihbgb.sa.com:2053
www.eihbgb.sa.com:2083
www.eihbgb.sa.com:2087
www.eihbgb.sa.com:2096
www.eihbgb.sa.com:4782
Verdict:
Malicious
Tags:
rat asyncrat Win.Packed.Razy-9807129-0
YARA:
Windows_Generic_Threat_ce98c4bc asyncrat win_asyncrat_unobfuscated
Unpacked files
SH256 hash:
851afa6f3343202f7cf017e1b4e7ada2063132ad3e726c26fc33e1d657e24586
MD5 hash:
bba1a19f6d2c846b3d09505e5d9838be
SHA1 hash:
27d76724dbb48bf181ee956d130ecdaa144ee33c
Detections:
AsyncRAT DCRat
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AcRat
Author:Nikos 'n0t' Totosis
Description:AcRat Payload (based on AsyncRat)
Rule name:dcrat
Author:jeFF0Falltrades
Rule name:dcrat_kingrat
Author:jeFF0Falltrades
Rule name:dcrat_rkp
Author:jeFF0Falltrades
Description:Detects DCRat payloads
Rule name:INDICATOR_SUSPICIOUS_EXE_DcRatBy
Author:ditekSHen
Description:Detects executables containing the string DcRatBy
Rule name:INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice
Author:ditekSHen
Description:Detects executables attemping to enumerate video devices using WMI
Rule name:MAL_AsnycRAT
Author:SECUINFRA Falcon Team
Description:Detects AsnycRAT based on it's config decryption routine
Rule name:MAL_AsyncRAT_Config_Decryption
Author:SECUINFRA Falcon Team
Description:Detects AsnycRAT based on it's config decryption routine
Rule name:Mal_WIN_AsyncRat_RAT_PE
Author:Phatcharadol Thangplub
Description:Use to detect AsyncRAT implant.
Rule name:Multifamily_RAT_Detection
Author:Lucas Acha (http://www.lukeacha.com)
Description:Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables
Rule name:NET
Author:malware-lu
Rule name:Njrat
Author:botherder https://github.com/botherder
Description:Njrat
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_DOTNET_PE_List_AV
Author:SECUINFRA Falcon Team
Description:Detecs .NET Binary that lists installed AVs
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:Windows_Generic_Threat_ce98c4bc
Author:Elastic Security
Rule name:win_asyncrat_unobfuscated
Author:Matthew @ Embee_Research
Description:Detects strings present in unobfuscated AsyncRat Samples. Rule may also pick up on other Asyncrat-derived malware (Dcrat/venom etc)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AsyncRAT

Executable exe 851afa6f3343202f7cf017e1b4e7ada2063132ad3e726c26fc33e1d657e24586

(this sample)

Comments