MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a6e752bb42b49e83d8a7a2edf68cfd5e605185b2508a3ff03eb13aff9130a74a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: a6e752bb42b49e83d8a7a2edf68cfd5e605185b2508a3ff03eb13aff9130a74a
SHA3-384 hash: cff601862641c319f1d6ace1ebabbbd9637fd3161657f3df3bf4e82f759f39467dbbd1ebfacabce00ff3af2956c7c8a5
SHA1 hash: 91b03942a2176a8d90c6a83641edc6b021c68183
MD5 hash: 7c1da46fd6add0fdcf359101f77f47e2
humanhash: fifteen-utah-beer-apart
File name:a6e752bb42b49e83d8a7a2edf68cfd5e605185b2508a3ff03eb13aff9130a74a.js
Download: download sample
Signature AsyncRAT
File size:6'099'699 bytes
First seen:2026-02-10 09:00:25 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 768:1wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwo:dt6
TLSH T1005612412E26988132E429772A3077810E1EA6EB23BFE719F947DEE9FF4784BC570154
Magika javascript
Reporter JAMESWT_WT
Tags:AsyncRAT hostphpwindowsapps-ydns-eu js startmenuexperiencehost-ydns-eu

Intelligence


File Origin
# of uploads :
1
# of downloads :
129
Origin country :
IT IT
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
99.1%
Tags:
obfuscate xtreme virus
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm base64 base64 fingerprint obfuscated obfuscated overlay powershell repaired
Verdict:
Malicious
File Type:
js
First seen:
2026-02-10T06:14:00Z UTC
Last seen:
2026-02-10T06:46:00Z UTC
Hits:
~10
Detections:
Trojan.JS.SAgent.sb HEUR:Trojan.Script.Generic
Verdict:
inconclusive
YARA:
1 match(es)
Threat name:
Script-JS.Trojan.ObfPadding
Status:
Malicious
First seen:
2026-02-03 16:05:05 UTC
File Type:
Text (JavaScript)
AV detection:
6 of 24 (25.00%)
Threat level:
  5/5
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat botnet:**** 28 **** discovery execution rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
AsyncRat
Asyncrat family
Process spawned unexpected child process
Malware Config
C2 Extraction:
startmenuexperiencehost.ydns.eu:8849
startmenuexperiencehost.ydns.eu:8848
Dropper Extraction:
http://hostphpwindowsapps.ydns.eu:8011/data/optimized_MSI.png
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments