MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 9ba6343e794c0e415adb118885c33aa18446c746dd30ec59b4fda2724b2f08d7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AsyncRAT
Vendor detections: 9
| SHA256 hash: | 9ba6343e794c0e415adb118885c33aa18446c746dd30ec59b4fda2724b2f08d7 |
|---|---|
| SHA3-384 hash: | 11b46be29a2da1c74ab42403b0ebbbb3beb8a7b9cc708e5ab8c78ae4de19fa6116945a0c28a0ce30471e177feabfd7c1 |
| SHA1 hash: | fb016666d6963e136f241908efed90b56e57b082 |
| MD5 hash: | 723f32a52c1aa09334b96647b4fb6beb |
| humanhash: | fourteen-sierra-bulldog-carpet |
| File name: | Proforma Invoice 09.PDF.exe |
| Download: | download sample |
| Signature | AsyncRAT |
| File size: | 248'832 bytes |
| First seen: | 2020-07-29 06:45:03 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger) |
| ssdeep | 6144:2ytlNAqr8+7q6LIv8iEUtx1pTgTmCIfL:ttrXZLRiNtx1pTTvz |
| Threatray | 5'013 similar samples on MalwareBazaar |
| TLSH | 2534CF2463A68F17D55ED3F80A17A80123B9EDA9C472E34C0EC572DF99B2FB16460B47 |
| Reporter | |
| Tags: | AsyncRAT exe nVpn RAT |
abuse_ch
Malspam distributing AsyncRAT:HELO: albayrakbeton.com.tr
Sending IP: 45.90.222.242
From: Banu ALAKENT <banualakent@albayrakbeton.com.tr>
Subject: FW: We are sending oficial Proforma Invoice for Bank enclosed.
Attachment: Proforma Invoice 09.PDF.ARJ (contains "Proforma Invoice 09.PDF.exe")
AsyncRAT C2:
79.134.225.55:9654
Hosted on nVpn:
% Information related to '79.134.225.0 - 79.134.225.127'
% Abuse contact for '79.134.225.0 - 79.134.225.127' is 'abuse@privacyfirst.sh'
inetnum: 79.134.225.0 - 79.134.225.127
netname: PRIVACYFIRST-EU
country: EU
remarks: This prefix is assigned to The PRIVACYFIRST Project, which
remarks: operates infrastructure jointly used by various VPN service
remarks: providers. We have a very strong focus on privacy and freedom.
remarks: In case of abuse, we encourage all international law enforcement
remarks: agencies to get in touch with our abuse contact. Due to the fact
remarks: that we keep no logs of user activities and only share data when
remarks: it is legally required under our jurisdiction, it is very unlikely
remarks: for a demand of user information to be successful. Still, that
remarks: should not deter you from reaching out.
admin-c: TPP15-RIPE
tech-c: TPP15-RIPE
status: ASSIGNED PA
mnt-by: AF15-MNT
org: ORG-TPP6-RIPE
created: 2020-07-14T15:26:02Z
last-modified: 2020-07-14T15:31:06Z
source: RIPE
Intelligence
File Origin
# of uploads :
1
# of downloads :
71
Origin country :
n/a
Vendor Threat Intelligence
Detection:
Ispy
Result
Verdict:
Malware
Maliciousness:
Behaviour
Sending a custom TCP request
Unauthorized injection to a recently created process
Connection attempt
Connection attempt to an infection source
Result
Threat name:
AsyncRAT
Detection:
malicious
Classification:
troj.evad
Score:
88 / 100
Signature
.NET source code contains potential unpacker
Executable has a suspicious name (potential lure to open the executable)
Initial sample is a PE file and has a suspicious name
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Double Extension
Uses an obfuscated file name to hide its real file extension (double extension)
Yara detected AsyncRAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Kryptik
Status:
Malicious
First seen:
2020-07-29 02:38:35 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 5'003 additional samples on MalwareBazaar
Result
Malware family:
asyncrat
Score:
10/10
Tags:
rat family:asyncrat
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Async RAT payload
AsyncRat
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Eldorado
Score:
0.90
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.