MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 91d5fd40e83493f75c087353ab3c17d1a934398bba79be8cdf14d1ec7595be35. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 91d5fd40e83493f75c087353ab3c17d1a934398bba79be8cdf14d1ec7595be35
SHA3-384 hash: c9844758a24ab9cdc5601af7dce1d6d6d2014ce29427a6217ebab4c53a4e64d94a8c491ee14fd05efca18dcc3bedb889
SHA1 hash: 370a53aaddf8a6fbad4df1c05e2136f663a8b06e
MD5 hash: 2361ca81240ccdd5f9307cdd3eb9ee4e
humanhash: failed-charlie-thirteen-nitrogen
File name:PO_4123.msi
Download: download sample
Signature AsyncRAT
File size:1'036'288 bytes
First seen:2022-03-29 07:13:45 UTC
Last seen:Never
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 12288:nAItMRQ+gjpjegLyo8Q6pwmjK+kk9HrGCe/n5R2swSJaGidpn8MakTJbkWEeTuIw:ltWcpVLSfZLGC87wLikT5dEeZZne8yx
Threatray 12'019 similar samples on MalwareBazaar
TLSH T1B825029137C9C536E29F063646BA8776363A7C351B21C1CBA7943D6C4E317E3AA39312
Reporter abuse_ch
Tags:AsyncRAT msi

Intelligence


File Origin
# of uploads :
1
# of downloads :
152
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
cmd.exe expand.exe fingerprint packed shell32.dll
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AsyncRAT
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Checks if UnHackMe application is installed (likely to disable it)
Contains functionality to detect sleep reduction / modifications
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AsyncRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 598965 Sample: PO_4123.msi Startdate: 29/03/2022 Architecture: WINDOWS Score: 100 38 Found malware configuration 2->38 40 Malicious sample detected (through community Yara rule) 2->40 42 Multi AV Scanner detection for dropped file 2->42 44 4 other signatures 2->44 8 msiexec.exe 12 22 2->8         started        11 msiexec.exe 5 2->11         started        process3 file4 32 C:\Windows\Installer\MSIB85B.tmp, PE32 8->32 dropped 34 C:\Windows\Installer\MSI931D.tmp, PE32 8->34 dropped 13 msiexec.exe 5 8->13         started        process5 process6 15 EcDDyE9vGT8STT2d.exe 13->15         started        18 expand.exe 4 13->18         started        21 icacls.exe 13->21         started        23 icacls.exe 13->23         started        file7 46 Checks if UnHackMe application is installed (likely to disable it) 15->46 48 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 15->48 50 Injects a PE file into a foreign processes 15->50 52 Contains functionality to detect sleep reduction / modifications 15->52 25 EcDDyE9vGT8STT2d.exe 2 4 15->25         started        28 C:\Users\user\...cDDyE9vGT8STT2d.exe (copy), PE32 18->28 dropped 30 C:\...\eeec68fbdf53c54894235120c7dd11d3.tmp, PE32 18->30 dropped signatures8 process9 dnsIp10 36 185.222.58.36, 4449, 49170, 49173 ROOTLAYERNETNL Netherlands 25->36
Threat name:
ByteCode-MSIL.Backdoor.Crysan
Status:
Malicious
First seen:
2022-03-29 07:14:16 UTC
File Type:
Binary (Archive)
Extracted files:
49
AV detection:
17 of 26 (65.38%)
Threat level:
  5/5
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat discovery rat
Behaviour
Checks SCSI registry key(s)
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Suspicious use of SetThreadContext
Enumerates connected drives
Loads dropped DLL
Modifies file permissions
Executes dropped EXE
Async RAT payload
AsyncRat
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:quakbot_halo_generated
Author:Halogen Generated Rule, Corsin Camichel

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments