MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8ad4ee4f8c4ec47148635ecd1f3f70506b96752ad0c018fa5bc36596d559ec81. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 12


Intelligence 12 IOCs YARA 80 File information Comments

SHA256 hash: 8ad4ee4f8c4ec47148635ecd1f3f70506b96752ad0c018fa5bc36596d559ec81
SHA3-384 hash: f76efb9823ab71708e9373fc8df5b0b6beba28e8a0d500d395033bcf87c1c9544f336d0678a2f3f58189eae65db892e1
SHA1 hash: df8c29fe0a2e7fdf414d69de90d0bfa72183ba7d
MD5 hash: d468d54c2f95df99137a8f3074daa9fc
humanhash: mexico-red-friend-mike
File name:8ad4ee4f8c4ec47148635ecd1f3f70506b96752ad0c018fa5bc36596d559ec81
Download: download sample
Signature AsyncRAT
File size:2'845'820 bytes
First seen:2026-04-28 10:21:35 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 49152:Im5fiUjQo0QDlWtzoD3atAAs7AaHqnNLbdVkGuRhdO8OMqS3h21qIPh27:Im5VQo1DlWZoD3Ss7QVqoA+PU7
TLSH T16ED533E3D69EE152D0C4D07C39C6094A63FF0FA69E33989673CEC09946E89836E1C675
Magika zip
Reporter JAMESWT_WT
Tags:AsyncRAT zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
171
Origin country :
IT IT
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:rename.exe
File size:6'495'240 bytes
SHA256 hash: 8a87aae368cd9817f313ece0e4bb52568017c01e245b7883b03db4bb03d80a1a
MD5 hash: 5d7c38a454572e068141a98991b4ac42
MIME type:application/x-dosexec
Signature AsyncRAT
Vendor Threat Intelligence
Result
Verdict:
Malicious
File Type:
PE File
Behaviour
BlacklistAPI detected
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug anti-vm asyncrat barys base64 crypto fingerprint microsoft_visual_cc njrat overlay reconnaissance unsafe xworm xworm
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
File Type:
zip
First seen:
2026-04-25T06:21:00Z UTC
Last seen:
2026-04-28T07:36:00Z UTC
Hits:
~10
Gathering data
Threat name:
Win64.Backdoor.Xworm
Status:
Malicious
First seen:
2026-04-25 06:12:13 UTC
File Type:
Binary (Archive)
Extracted files:
4
AV detection:
27 of 36 (75.00%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ByteCode_MSIL_Backdoor_AsyncRAT
Author:ReversingLabs
Description:Yara rule that detects AsyncRAT backdoor.
Rule name:Check_Dlls
Rule name:Check_OutputDebugStringA_iat
Rule name:Check_Qemu_Description
Rule name:Check_Qemu_DeviceMap
Rule name:Check_VBox_Description
Rule name:Check_VBox_DeviceMap
Rule name:Check_VMWare_DeviceMap
Rule name:cobalt_strike_beacon_detected
Author:0x0d4y
Description:This rule detects cobalt strike beacons.
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:dependsonpythonailib
Author:Tim Brown
Description:Hunts for dependencies on Python AI libraries
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:Glasses
Author:Seth Hardy
Description:Glasses family
Rule name:GlassesCode
Author:Seth Hardy
Description:Glasses code features
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Author:ditekSHen
Description:Detects Windows executables referencing non-Windows User-Agents
Rule name:INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL
Author:ditekSHen
Description:Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion
Rule name:INDICATOR_SUSPICIOUS_EXE_SandboxProductID
Author:ditekSHen
Description:Detects binaries and memory artifacts referencing sandbox product IDs
Rule name:MALWARE_Win_AsyncRAT
Author:ditekSHen
Description:Detects AsyncRAT
Rule name:MALWARE_Win_XWorm
Author:ditekSHen
Description:Detects XWorm
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:Njrat
Author:botherder https://github.com/botherder
Description:Njrat
Rule name:pe_detect_tls_callbacks
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:Surtr
Author:Katie Kleemola
Description:Rule for Surtr Stage One
Rule name:SurtrStrings
Author:Katie Kleemola
Description:Strings for Surtr
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:telebot_framework
Author:vietdx.mb
Rule name:TH_AntiVM_MassHunt_Win_Malware_2026_CYFARE
Author:CYFARE
Description:Detects Windows malware employing anti-VM / anti-sandbox evasion techniques across VMware, VirtualBox, Hyper-V, QEMU, Xen, and generic sandbox environments
Reference:https://cyfare.net/
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:Weedhack_Family_Generic
Author:jlab
Description:Generic Weedhack family detection
Rule name:win_rat_generic
Author:Reedus0
Description:Rule for detecting generic RAT malware
Rule name:win_stealer_generic
Author:Reedus0
Description:Rule for detecting generic stealer malware
Rule name:win_xworm_a0
Author:Slavo Greminger, SWITCH-CERT
Rule name:win_xworm_w0
Author:jeFF0Falltrades
Description:Detects win.xworm.
Rule name:XWorm
Author:ditekSHen
Description:Detects XWorm
Rule name:xworm
Author:jeFF0Falltrades
Rule name:xworm_kingrat
Author:jeFF0Falltrades

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AsyncRAT

zip 8ad4ee4f8c4ec47148635ecd1f3f70506b96752ad0c018fa5bc36596d559ec81

(this sample)

  
Delivery method
Distributed via web download

Comments