MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 90f58865f265722ab007abb25074b3fc4916e927402552c6be17ef9afac96405. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AsyncRAT
Vendor detections: 15
| SHA256 hash: | 90f58865f265722ab007abb25074b3fc4916e927402552c6be17ef9afac96405 |
|---|---|
| SHA3-384 hash: | addead34a3df01a86c08ecbc0d4d6fbb944f94a126cb93bd2e930e3e127bb78a40eb04ba3e0be54b2f50dcab6ae824a4 |
| SHA1 hash: | 5b01b90137871c3c8f0d04f510c4d56b23932cbc |
| MD5 hash: | 56ccb739926a725e78a7acf9af52c4bb |
| humanhash: | five-sierra-hydrogen-missouri |
| File name: | Xworm V5.6.exe |
| Download: | download sample |
| Signature | AsyncRAT |
| File size: | 15'602'688 bytes |
| First seen: | 2024-07-15 12:26:18 UTC |
| Last seen: | 2024-07-24 19:02:48 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'663 x AgentTesla, 19'478 x Formbook, 12'208 x SnakeKeylogger) |
| ssdeep | 196608:P4/BAe1d4ihvy85JhhYc3BSL1kehn4inje:PuyIhhkRka4i |
| Threatray | 6 similar samples on MalwareBazaar |
| TLSH | T10EF69D107BD68006E47269B00A946AE199BEBEAF2B15D8AD30C4335C17F64CCF953BF5 |
| TrID | 56.2% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 12.7% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 8.0% (.EXE) Win64 Executable (generic) (10523/12/4) 5.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.2% (.FON) Windows Font (5545/9/1) |
| File icon (PE): | |
| dhash icon | 8eccf86171e4cc8e (8 x AsyncRAT, 3 x XWorm, 2 x RedLineStealer) |
| Reporter | Anonymous |
| Tags: | AsyncRAT exe |
Intelligence
File Origin
BRVendor Threat Intelligence
Result
Behaviour
Result
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
90f58865f265722ab007abb25074b3fc4916e927402552c6be17ef9afac96405
fa91e6e3eba2e4deb6ff092b9bf94944ce12b9346d5db218497602d08098094a
238bd89de11cbe6b00e7bf57f13863394bed494b73d09570011f27b87270b51a
bfbba360c8bf4ce938b03724c44f8769c5d490dac37e835208c49e4244e6059b
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | Base64_decoding |
|---|---|
| Author: | iam-py-test |
| Description: | Detect scripts which are decoding base64 encoded data (mainly Python, may apply to other languages) |
| Rule name: | DebuggerCheck__RemoteAPI |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerException__SetConsoleCtrl |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | Disable_Defender |
|---|---|
| Author: | iam-py-test |
| Description: | Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen |
| Rule name: | grakate_stealer_nov_2021 |
|---|
| Rule name: | INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Windows executables referencing non-Windows User-Agents |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_RawPaste_URL |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables (downlaoders) containing URLs to raw contents of a paste |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | Jupyter_infostealer |
|---|---|
| Author: | CD_R0M_ |
| Description: | Rule for Jupyter Infostealer/Solarmarker malware from september 2021-December 2022 |
| Rule name: | maldoc_indirect_function_call_3 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
| Rule name: | maldoc_OLE_file_magic_number |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
| Rule name: | MALWARE_Win_AsyncRAT |
|---|---|
| Author: | ditekSHen |
| Description: | Detects AsyncRAT |
| Rule name: | MALWARE_Win_XWorm |
|---|---|
| Author: | ditekSHen |
| Description: | Detects XWorm |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | QbotStuff |
|---|---|
| Author: | anonymous |
| Rule name: | RIPEMD160_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for RIPEMD-160 constants |
| Rule name: | SHA1_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for SHA1 constants |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | vmdetect |
|---|---|
| Author: | nex |
| Description: | Possibly employs anti-virtualization techniques |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (GUARD_CF) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.