MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a7adeed2290a6e7d4b061a44337ebbcdc91a9800e40cc96a31632e3e52d710ff. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 14


Intelligence 14 IOCs YARA File information Comments 1

SHA256 hash: a7adeed2290a6e7d4b061a44337ebbcdc91a9800e40cc96a31632e3e52d710ff
SHA3-384 hash: 3e603d3638187f5ca2c06e48a5ef262d6ce4a51b55e5ced8f23759b15a44ad2a309e9139c4d4670b44b1203cfa1ac88d
SHA1 hash: b55a18a2d13589b81cae82c691d83e7961799d44
MD5 hash: 0b459466e3619d2a29bb93ea2dac077a
humanhash: apart-cola-ack-cola
File name:0b459466e3619d2a29bb93ea2dac077a
Download: download sample
Signature AsyncRAT
File size:66'234'368 bytes
First seen:2024-03-28 15:21:43 UTC
Last seen:2024-03-28 17:19:49 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash a9c887a4f18a3fede2cc29ceea138ed3 (33 x CoinMiner, 17 x AsyncRAT, 15 x BlankGrabber)
ssdeep 1572864:iFffrC4ndj0tJT5vMiaUMeRBFGkdWEeJFj3w:gf24dj6T5TaUTBbdheXw
Threatray 211 similar samples on MalwareBazaar
TLSH T1A6E733102189D9B9D1F8A5BDDF2FD90214EC53A129D16BFF1C15C3250EBFEE2A89A1C1
TrID 45.6% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
13.9% (.EXE) Win16 NE executable (generic) (5038/12/1)
12.4% (.EXE) Win32 Executable (generic) (4504/4/1)
5.7% (.EXE) Win16/32 Executable Delphi generic (2072/23)
5.6% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter zbetcheckin
Tags:32 AsyncRAT exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
584
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
asyncrat
ID:
1
File name:
a7adeed2290a6e7d4b061a44337ebbcdc91a9800e40cc96a31632e3e52d710ff.exe
Verdict:
Malicious activity
Analysis date:
2024-03-28 15:23:26 UTC
Tags:
rat asyncrat remote

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a process with a hidden window
Creating a window
Creating a file
Launching a process
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
DNS request
Connection attempt
Sending a custom TCP request
Running batch commands
Creating a file in the %AppData% directory
Unauthorized injection to a recently created process
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
lolbin packed shell32
Result
Verdict:
MALICIOUS
Result
Threat name:
AsyncRAT, VenomRAT
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes (.Net Source)
Drops executable to a common third party application directory
Drops large PE files
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample uses process hollowing technique
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected AsyncRAT
Yara detected Generic Downloader
Yara detected UAC Bypass using CMSTP
Yara detected VenomRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1417125 Sample: Sldl84wxy8.exe Startdate: 28/03/2024 Architecture: WINDOWS Score: 100 70 leetboy.dynuddns.net 2->70 72 blue.o7lab.me 2->72 74 4 other IPs or domains 2->74 86 Snort IDS alert for network traffic 2->86 88 Multi AV Scanner detection for domain / URL 2->88 90 Found malware configuration 2->90 94 17 other signatures 2->94 9 Sldl84wxy8.exe 4 2->9         started        12 svchos.exe 2->12         started        signatures3 92 Uses dynamic DNS services 70->92 process4 file5 54 C:\Users\user\AppData\...\svchost (3).exe, PE32+ 9->54 dropped 56 C:\Users\user\AppData\Local\Temp\start.exe, PE32 9->56 dropped 58 C:\Users\user\AppData\Local\Temp\build.exe, PE32 9->58 dropped 14 build.exe 179 9->14         started        18 svchost (3).exe 2 9->18         started        20 start.exe 9->20         started        process6 file7 60 C:\Users\user\AppData\Local\...\vulkan-1.dll, PE32+ 14->60 dropped 62 C:\Users\user\AppData\...\vk_swiftshader.dll, PE32+ 14->62 dropped 64 C:\Users\user\AppData\Local\Temp\...\main.exe, PE32+ 14->64 dropped 68 13 other files (8 malicious) 14->68 dropped 100 Multi AV Scanner detection for dropped file 14->100 102 Drops large PE files 14->102 22 main.exe 14->22         started        104 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 18->104 106 Writes to foreign memory regions 18->106 108 Allocates memory in foreign processes 18->108 114 2 other signatures 18->114 27 RegSvcs.exe 1 2 18->27         started        29 WerFault.exe 19 16 18->29         started        31 RegSvcs.exe 18->31         started        66 C:\Users\user\AppData\Roaming\svchos.exe, PE32 20->66 dropped 110 Antivirus detection for dropped file 20->110 112 Machine Learning detection for dropped file 20->112 33 cmd.exe 20->33         started        35 cmd.exe 20->35         started        signatures8 process9 dnsIp10 76 cosmicdust.zip 192.236.232.25, 443, 49721 HOSTWINDSUS United States 22->76 78 rentry.co 104.21.95.148, 443, 49720 CLOUDFLARENETUS United States 22->78 80 cosmoplanets.net 172.67.142.111, 443, 49722, 49723 CLOUDFLARENETUS United States 22->80 52 C:\Users\user\AppData\Roaming\...\Updater.exe, PE32 22->52 dropped 96 Drops executable to a common third party application directory 22->96 37 main.exe 22->37         started        39 main.exe 22->39         started        82 blue.o7lab.me 94.156.66.112, 4449, 49711 TERASYST-ASBG Bulgaria 27->82 98 Uses schtasks.exe or at.exe to add and modify task schedules 33->98 41 conhost.exe 33->41         started        43 schtasks.exe 33->43         started        45 svchos.exe 35->45         started        48 conhost.exe 35->48         started        50 timeout.exe 35->50         started        file11 signatures12 process13 dnsIp14 84 leetboy.dynuddns.net 185.196.11.223, 1339, 49716 SIMPLECARRIERCH Switzerland 45->84
Gathering data
Threat name:
Win32.Dropper.Dapato
Status:
Malicious
First seen:
2024-03-28 15:22:20 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
19 of 24 (79.17%)
Threat level:
  3/5
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat botnet:exodus_market botnet:wdkiller persistence rat spyware stealer
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Detects videocard installed
Enumerates processes with tasklist
Modifies registry key
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Async RAT payload
AsyncRat
Malware Config
C2 Extraction:
leetboy.dynuddns.net:1339
blue.o7lab.me:4449
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AsyncRAT

Executable exe a7adeed2290a6e7d4b061a44337ebbcdc91a9800e40cc96a31632e3e52d710ff

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
SHELL_APIManipulates System Shellshell32.dll::ShellExecuteA

Comments



Avatar
zbet commented on 2024-03-28 15:21:44 UTC

url : hxxp://93.123.39.68/order.exe