MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a95ce284875645f9a3d03d5df48b51a04f6933b2cf10aff3cb0a094fb1e3f89d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Arechclient2


Vendor detections: 9


Intelligence 9 IOCs YARA 6 File information Comments

SHA256 hash: a95ce284875645f9a3d03d5df48b51a04f6933b2cf10aff3cb0a094fb1e3f89d
SHA3-384 hash: 682c95502e1c601dc4cade3504050a6b7643385c5e5910a8d9c136fd5b628cb204231a4eac6417c185becc0bd02214a9
SHA1 hash: 361648d679b3c2f8957fa45c2f29fe922204f542
MD5 hash: d00f2fedb3b345812dbeb9931d4806b6
humanhash: zebra-nitrogen-ceiling-pizza
File name:a95ce284875645f9a3d03d5df48b51a04f6933b2cf10a.exe
Download: download sample
Signature Arechclient2
File size:6'096'936 bytes
First seen:2023-02-06 13:45:41 UTC
Last seen:2023-02-06 16:06:23 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c7c88a9f12777d4c1f156ccc8f276fa1 (3 x Arechclient2, 2 x RaccoonStealer, 2 x Amadey)
ssdeep 98304:omyYbPZoUnM0BznCOKDxRWxnvNWJAq6R+Yxkzi0os:fZMcu0xVWJiVp0os
Threatray 201 similar samples on MalwareBazaar
TLSH T17C56126311FF0060F4F278398627689571B6165FD90D887A24ADFECD3832A99A35FCC6
TrID 27.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
20.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
18.6% (.EXE) Win32 Executable (generic) (4505/5/1)
8.5% (.ICL) Windows Icons Library (generic) (2059/9)
8.3% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon b2ac98f68cf0c69a (2 x Arechclient2, 1 x RustyStealer, 1 x njrat)
Reporter abuse_ch
Tags:Arechclient2 exe


Avatar
abuse_ch
Arechclient2 C2:
162.55.188.246:15647

Intelligence


File Origin
# of uploads :
2
# of downloads :
205
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a95ce284875645f9a3d03d5df48b51a04f6933b2cf10a.exe
Verdict:
No threats detected
Analysis date:
2023-02-06 13:48:58 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
No Threat
Threat level:
  2/10
Confidence:
100%
Tags:
anti-debug overlay packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine, SectopRAT
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Self deletion via cmd or bat file
Sigma detected: Drops script at startup location
Snort IDS alert for network traffic
Tries to detect virtualization through RDTSC time measurements
Tries to evade analysis by execution special instruction (VM detection)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected RedLine Stealer
Yara detected SectopRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 799729 Sample: a95ce284875645f9a3d03d5df48... Startdate: 06/02/2023 Architecture: WINDOWS Score: 100 46 Snort IDS alert for network traffic 2->46 48 Multi AV Scanner detection for domain / URL 2->48 50 Malicious sample detected (through community Yara rule) 2->50 52 8 other signatures 2->52 7 a95ce284875645f9a3d03d5df48b51a04f6933b2cf10a.exe 5 2->7         started        11 xaroqu.exe 2->11         started        process3 file4 34 C:\ProgramData\bitame\xaroqu.exe, PE32 7->34 dropped 36 C:\ProgramData\...\xaroqu.exe:Zone.Identifier, ASCII 7->36 dropped 62 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 7->62 64 Query firmware table information (likely to detect VMs) 7->64 66 Self deletion via cmd or bat file 7->66 76 2 other signatures 7->76 13 xaroqu.exe 7->13         started        16 cmd.exe 1 7->16         started        68 Writes to foreign memory regions 11->68 70 Allocates memory in foreign processes 11->70 72 Hides threads from debuggers 11->72 74 Injects a PE file into a foreign processes 11->74 18 InstallUtil.exe 2 11->18         started        signatures5 process6 signatures7 78 Antivirus detection for dropped file 13->78 80 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 13->80 82 Query firmware table information (likely to detect VMs) 13->82 88 8 other signatures 13->88 20 InstallUtil.exe 15 4 13->20         started        24 InstallUtil.exe 13->24         started        26 InstallUtil.exe 13->26         started        28 InstallUtil.exe 13->28         started        84 Uses ping.exe to sleep 16->84 86 Uses ping.exe to check the status of other devices and networks 16->86 30 PING.EXE 1 16->30         started        32 conhost.exe 16->32         started        process8 dnsIp9 38 162.55.188.246, 15647, 49734, 49736 ACPCA United States 20->38 40 eth0.me 5.132.162.27, 49737, 80 INTERNEX-ASAT Austria 20->40 54 Tries to harvest and steal browser information (history, passwords, etc) 20->54 56 Tries to steal Crypto Currency Wallets 20->56 58 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 24->58 60 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 24->60 42 127.0.0.1 unknown unknown 30->42 44 192.168.2.1 unknown unknown 30->44 signatures10
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2023-02-06 13:46:10 UTC
File Type:
PE (Exe)
Extracted files:
11
AV detection:
14 of 26 (53.85%)
Threat level:
  5/5
Result
Malware family:
sectoprat
Score:
  10/10
Tags:
family:sectoprat evasion rat spyware trojan
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Looks up external IP address via web service
Checks computer location settings
Drops startup file
Executes dropped EXE
SectopRAT
SectopRAT payload
UAC bypass
Unpacked files
SH256 hash:
bdbdc77e3f02a141cf28bb717a900845fa0ef583cf6395c236970b0e81862d45
MD5 hash:
9d05f86de291223efd9a61d2c752ae8a
SHA1 hash:
423ba98e5cb4310e243da93028428f5c51df789b
SH256 hash:
a95ce284875645f9a3d03d5df48b51a04f6933b2cf10aff3cb0a094fb1e3f89d
MD5 hash:
d00f2fedb3b345812dbeb9931d4806b6
SHA1 hash:
361648d679b3c2f8957fa45c2f29fe922204f542
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:grakate_stealer_nov_2021
Rule name:MALWARE_Win_Arechclient2
Author:ditekSHen
Description:Detects Arechclient2 RAT
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_XORed_URL_in_EXE
Author:Florian Roth (Nextron Systems)
Description:Detects an XORed URL in an executable
Reference:https://twitter.com/stvemillertime/status/1237035794973560834
Rule name:SUSP_XORed_URL_in_EXE_RID2E46
Author:Florian Roth
Description:Detects an XORed URL in an executable
Reference:https://twitter.com/stvemillertime/status/1237035794973560834

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments