MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9085e6327177bb47cf43a8d8ed0c24fcfd50cde4199c5130f2b97b2508e9aabc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 18


Intelligence 18 IOCs 2 YARA 7 File information Comments

SHA256 hash: 9085e6327177bb47cf43a8d8ed0c24fcfd50cde4199c5130f2b97b2508e9aabc
SHA3-384 hash: 8ad796362c2d2bb15a9a4579fedaa5e953e8e696997c9a3ffd46e2381bac4086442fa3fa8f775a20d10fabe291e99c23
SHA1 hash: d1e83fbdc0bfaa92334eb043e3f37bbe1104cd68
MD5 hash: 1082572a44d4c41214a3c38dcd8289f9
humanhash: eight-sierra-hydrogen-twelve
File name:1082572a44d4c41214a3c38dcd8289f9.exe
Download: download sample
Signature AsyncRAT
File size:15'088'640 bytes
First seen:2024-07-06 11:25:13 UTC
Last seen:2024-07-06 12:23:44 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 1c99c85c193e659c86109d62f2b36c67 (1 x AsyncRAT)
ssdeep 393216:iXMxStQvFIeTiQvMipcK5x00D1lR/ggb/Dt:oXU1TzvMInx0QV/D
TLSH T107E6335EFA608A93E99D4238FC21F3B70B753CF45A72D696F95079DE6D32201CD28212
TrID 43.1% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
32.2% (.EXE) InstallShield setup (43053/19/16)
7.8% (.EXE) Win64 Executable (generic) (10523/12/4)
4.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
Reporter abuse_ch
Tags:AsyncRAT exe RAT


Avatar
abuse_ch
AsyncRAT C2:
94.232.249.204:1912

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
94.232.249.204:1912 https://threatfox.abuse.ch/ioc/1295167/
94.232.249.204:6606 https://threatfox.abuse.ch/ioc/1295168/

Intelligence


File Origin
# of uploads :
2
# of downloads :
561
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
9085e6327177bb47cf43a8d8ed0c24fcfd50cde4199c5130f2b97b2508e9aabc.exe
Verdict:
Malicious activity
Analysis date:
2024-07-06 11:26:34 UTC
Tags:
loader crypto-regex telegram opendir stealer redline metastealer evasion rat asyncrat remote phishing exfiltration pastebin

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
Execution Infostealer Network Stealth Variant
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Creating a file in the %temp% directory
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Creating a file
Delayed writing of the file
Creating a window
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug explorer fingerprint hacktool lolbin lolbin microsoft_visual_cc packed packed phishing remote shell32
Result
Verdict:
MALICIOUS
Malware family:
RedLine Stealer
Verdict:
Malicious
Result
Threat name:
AsyncRAT, AveMaria, Keyzetsu Clipper, Mi
Detection:
malicious
Classification:
rans.phis.troj.adwa.spyw.evad.mine
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large strings
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory in foreign processes
Benign windows process drops PE files
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Changes memory attributes in foreign processes to executable or writable
Connects to a pastebin service (likely for C&C)
Contains functionality to capture screen (.Net source)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Contains functionality to log keystrokes (.Net Source)
Creates a thread in another existing process (thread injection)
Creates multiple autostart registry keys
Drops executable to a common third party application directory
Drops PE files with benign system names
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies existing user documents (likely ransomware behavior)
Modifies the context of a thread in another process (thread injection)
Modifies the hosts file
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites Mozilla Firefox settings
Performs DNS queries to domains with low reputation
Protects its processes via BreakOnTermination flag
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Capture Wi-Fi password
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: System File Execution Location Anomaly
Snort IDS alert for network traffic
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected AsyncRAT
Yara detected AveMaria stealer
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Yara detected Keyzetsu Clipper
Yara detected MicroClip
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected RL STEALER
Yara detected StormKitty Stealer
Yara detected Telegram RAT
Yara detected Telegram Recon
Yara detected VenomRAT
Yara detected WorldWind Stealer
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1468518 Sample: xj40xovMsm.exe Startdate: 06/07/2024 Architecture: WINDOWS Score: 100 132 pastebin.com 2->132 134 freegeoip.app 2->134 136 14 other IPs or domains 2->136 168 Snort IDS alert for network traffic 2->168 170 Multi AV Scanner detection for domain / URL 2->170 172 Found malware configuration 2->172 178 35 other signatures 2->178 14 xj40xovMsm.exe 6 33 2->14         started        19 svchost.exe 1 1 2->19         started        signatures3 174 Connects to a pastebin service (likely for C&C) 132->174 176 Tries to detect the country of the analysis system (by using the IP) 134->176 process4 dnsIp5 156 auth.xn--conbase-sfb.xyz 188.114.97.3, 443, 49730, 49731 CLOUDFLARENETUS European Union 14->156 124 C:\Users\...\{B955B2CC07A01546086603}.exe, PE32+ 14->124 dropped 126 C:\Users\...\Service_com.adobe.dunamis.exe, PE32+ 14->126 dropped 128 C:\Users\user\AppData\...\Service_Skype.exe, PE32+ 14->128 dropped 130 6 other malicious files 14->130 dropped 160 Creates multiple autostart registry keys 14->160 162 Contains functionality to inject threads in other processes 14->162 164 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 14->164 166 4 other signatures 14->166 21 relog.exe 14 14->21         started        158 127.0.0.1 unknown unknown 19->158 file6 signatures7 process8 file9 88 C:\Users\user\AppData\...\update[1].pack, PE32+ 21->88 dropped 90 C:\Users\user\AppData\...\update2[1].pack, PE32+ 21->90 dropped 92 C:\Windows\System32\drivers\etc\hosts, ASCII 21->92 dropped 94 C:\Users\user\AppData\Roaming\...\prefs.js, ASCII 21->94 dropped 186 Protects its processes via BreakOnTermination flag 21->186 188 Changes memory attributes in foreign processes to executable or writable 21->188 190 Contains functionality to inject threads in other processes 21->190 192 8 other signatures 21->192 25 explorer.exe 20 22 21->25 injected signatures10 process11 dnsIp12 150 hrdc.pk 64.31.40.18, 49742, 80 LIMESTONENETWORKSUS United States 25->150 152 www.westnilebirdingandsafari.com 75.119.203.100, 49760, 80 DREAMHOST-ASUS United States 25->152 154 2 other IPs or domains 25->154 96 C:\Users\user\AppData\...\62AB.tmp.build.exe, PE32 25->96 dropped 98 C:\Users\user\AppData\...\5E16.tmp.aaa.exe, PE32 25->98 dropped 100 C:\Users\user\AppData\...\53A5.tmp.update.exe, PE32 25->100 dropped 102 5 other malicious files 25->102 dropped 206 System process connects to network (likely due to code injection or exploit) 25->206 208 Benign windows process drops PE files 25->208 210 Found many strings related to Crypto-Wallets (likely being stolen) 25->210 212 2 other signatures 25->212 30 5087.tmp.update.exe 25->30         started        34 4336.tmp.Server.exe 25->34         started        37 xj40xovMsm.exe 25->37         started        39 10 other processes 25->39 file13 signatures14 process15 dnsIp16 106 C:\Users\user\AppData\Roaming\svchost.exe, PE32 30->106 dropped 108 C:\Users\user\AppData\...\tmp7CD3.tmp.bat, DOS 30->108 dropped 218 Creates multiple autostart registry keys 30->218 238 2 other signatures 30->238 41 cmd.exe 30->41         started        138 pastebin.com 172.67.19.24, 443, 49895, 49903 CLOUDFLARENETUS United States 34->138 140 icanhazip.com 104.16.184.241, 49879, 49889, 80 CLOUDFLARENETUS United States 34->140 142 api.mylnikov.org 172.67.196.114, 443, 49882, 49891 CLOUDFLARENETUS United States 34->142 110 C:\Users\user\AppData\...\VLZDGUKUTZ.docx, ASCII 34->110 dropped 112 C:\Users\user\AppData\...\VLZDGUKUTZ.docx, ASCII 34->112 dropped 114 C:\Users\user\AppData\...\UMMBDNEQBN.xlsx, ASCII 34->114 dropped 122 2 other malicious files 34->122 dropped 220 Multi AV Scanner detection for dropped file 34->220 222 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 34->222 224 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 34->224 240 2 other signatures 34->240 44 cmd.exe 34->44         started        46 cmd.exe 34->46         started        116 C:\...\Service_{B955B2CC07A01546086603}.exe, PE32+ 37->116 dropped 118 C:\Users\user\AppData\Local\...\zbi[1].exe, PE32+ 37->118 dropped 226 Writes to foreign memory regions 37->226 228 Modifies the context of a thread in another process (thread injection) 37->228 230 Maps a DLL or memory area into another process 37->230 48 relog.exe 37->48         started        144 api.telegram.org 149.154.167.220, 443, 49751, 49767 TELEGRAMRU United Kingdom 39->144 146 94.232.249.204, 1912, 49777, 49779 INT-PDN-STE-ASSTEPDNInternalASSY Syrian Arab Republic 39->146 148 4 other IPs or domains 39->148 120 C:\ProgramData\KMSAuto\accc.exe, PE32 39->120 dropped 232 Tries to steal Mail credentials (via file / registry access) 39->232 234 Found many strings related to Crypto-Wallets (likely being stolen) 39->234 236 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 39->236 242 4 other signatures 39->242 50 cmd.exe 39->50         started        52 accc.exe 39->52         started        54 relog.exe 39->54         started        56 4 other processes 39->56 file17 signatures18 process19 signatures20 194 Suspicious powershell command line found 41->194 196 Bypasses PowerShell execution policy 41->196 198 Uses netsh to modify the Windows network and firewall settings 41->198 58 svchost.exe 41->58         started        68 2 other processes 41->68 200 Tries to harvest and steal WLAN passwords 44->200 70 4 other processes 44->70 72 3 other processes 46->72 202 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 48->202 74 4 other processes 50->74 204 Multi AV Scanner detection for dropped file 52->204 62 conhost.exe 56->62         started        64 conhost.exe 56->64         started        66 timeout.exe 56->66         started        76 3 other processes 56->76 process21 file22 104 C:\Users\user\AppData\Local\Temp\jqnnpe.exe, PE32 58->104 dropped 214 System process connects to network (likely due to code injection or exploit) 58->214 78 cmd.exe 58->78         started        signatures23 process24 signatures25 216 Suspicious powershell command line found 78->216 81 powershell.exe 78->81         started        83 conhost.exe 78->83         started        process26 process27 85 jqnnpe.exe 81->85         started        signatures28 180 Tries to steal Mail credentials (via file / registry access) 85->180 182 Tries to harvest and steal browser information (history, passwords, etc) 85->182 184 Tries to steal Crypto Currency Wallets 85->184
Verdict:
malicious
Result
Malware family:
stormkitty
Score:
  10/10
Tags:
family:asyncrat family:redline family:stormkitty botnet:1 botnet:default botnet:venom clients collection discovery execution infostealer persistence rat spyware stealer
Behaviour
Delays execution with timeout.exe
Modifies system certificate store
Scheduled Task/Job: Scheduled Task
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Command and Scripting Interpreter: PowerShell
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Drops desktop.ini file(s)
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Drops file in Drivers directory
Async RAT payload
AsyncRat
RedLine
RedLine payload
StormKitty
StormKitty payload
Malware Config
C2 Extraction:
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6082381502:AAEEe5dVvSMdEf-_fKUh7iRqcNun3Q5DzxM/sendMessage?chat_id=5795480469
94.232.249.204:6606
94.232.249.204:7707
94.232.249.204:8808
94.232.249.204:6660
94.232.249.204:1912
Unpacked files
SH256 hash:
eeea86d3110b0f9cc0c439efe82b0dbb3994158dc4bc32a7c447481343ffc04e
MD5 hash:
299f27be15e3b3a42842476bdc206d35
SHA1 hash:
77504da60624688044f24470f6496b6533a29eb8
SH256 hash:
9085e6327177bb47cf43a8d8ed0c24fcfd50cde4199c5130f2b97b2508e9aabc
MD5 hash:
1082572a44d4c41214a3c38dcd8289f9
SHA1 hash:
d1e83fbdc0bfaa92334eb043e3f37bbe1104cd68
Detections:
ReflectiveLoader BroEx
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BroEx
Author:@bartblaze
Description:Detects BroEx, a type of agressive adware.
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:ReflectiveLoader
Author:Florian Roth (Nextron Systems)
Description:Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended
Reference:Internal Research
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:virustotal
Author:Tracel

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high
Reviews
IDCapabilitiesEvidence
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
KERNEL_APIManipulates Windows Kernel & Driversntdll.dll::RtlInitUnicodeString
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AdjustTokenPrivileges
ADVAPI32.dll::GetTokenInformation
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateRemoteThread
ADVAPI32.dll::OpenProcessToken
KERNEL32.dll::OpenProcess
KERNEL32.dll::VirtualAllocEx
KERNEL32.dll::WriteProcessMemory
WININET.dll::InternetCloseHandle
KERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::GetVolumeInformationA
KERNEL32.dll::GetStartupInfoW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::ReadConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CopyFileW
KERNEL32.dll::CopyFileA
KERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateDirectoryA
KERNEL32.dll::CreateFileW
KERNEL32.dll::CreateFileMappingA
WIN_BASE_USER_APIRetrieves Account InformationADVAPI32.dll::LookupPrivilegeValueA
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegOpenKeyExA
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegSetValueExA
ADVAPI32.dll::RegSetValueExW

Comments