MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 abe7cc92554b2defc6c336d5cafabe798f1f6c75076ccce897d6337fdbc42fd5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AsyncRAT
Vendor detections: 14
| SHA256 hash: | abe7cc92554b2defc6c336d5cafabe798f1f6c75076ccce897d6337fdbc42fd5 |
|---|---|
| SHA3-384 hash: | ecd66e0d23deb4dd95a0dc2f3008cbd6de5062afb84cb4c8198b804fb329174f0f80970706c0acfbb3e366f605f0b93c |
| SHA1 hash: | 3732116b8ef5ee6094ea49a0658dcb7a7adb2634 |
| MD5 hash: | 467e95c9a46987552925c47bc7b38916 |
| humanhash: | solar-bakerloo-single-uranus |
| File name: | abe7cc92554b2defc6c336d5cafabe798f1f6c75076ccce897d6337fdbc42fd5 |
| Download: | download sample |
| Signature | AsyncRAT |
| File size: | 11'140'776 bytes |
| First seen: | 2024-11-14 18:55:03 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | b5a014d7eeb4c2042897567e1288a095 (19 x HijackLoader, 14 x ValleyRAT, 12 x LummaStealer) |
| ssdeep | 196608:FppMHcmWuVIdrgeXoNY9kRsYuXZx7bbWtKm2eRe2tfny7NY+Uvl7a9tJJwZ4OZ7c:Fppky+IJX9kIOATpYtl7a9ZwZBZY |
| Threatray | 3 similar samples on MalwareBazaar |
| TLSH | T1A9B63394B5E358F3C17521B0EC696C1222B7A32A45E14E0B8BC76F1946E37A7428F35F |
| TrID | 38.7% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 24.6% (.EXE) Win64 Executable (generic) (10522/11/4) 11.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 10.5% (.EXE) Win32 Executable (generic) (4504/4/1) 4.7% (.EXE) OS/2 Executable (generic) (2029/13) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | 78e4c0dc84f4f040 (1 x AsyncRAT) |
| Reporter | |
| Tags: | AsyncRAT exe sirnisirlo-online |
Intelligence
File Origin
# of uploads :
1
# of downloads :
407
Origin country :
ITVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
abe7cc92554b2defc6c336d5cafabe798f1f6c75076ccce897d6337fdbc42fd5
Verdict:
Malicious activity
Analysis date:
2024-11-14 19:05:51 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection(s):
Verdict:
Malicious
Score:
99.9%
Tags:
virus gates
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Creating a file
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file in the %AppData% subdirectories
Launching cmd.exe command interpreter
Creating a file in the %temp% directory
Connection attempt
Transferring files using the Background Intelligent Transfer Service (BITS)
Enabling the 'hidden' option for recently created files
Unauthorized injection to a recently created process
Unauthorized injection to a system process
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
fingerprint installer microsoft_visual_cc overlay packed packed packer_detected
Verdict:
Malicious
Labled as:
Win/grayware_confidence_70%
Malware family:
AsyncRAT
Verdict:
Malicious
Result
Threat name:
n/a
Detection:
malicious
Classification:
spyw.expl.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Drops PE files to the user root directory
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Writes to foreign memory regions
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
Score:
89%
Verdict:
Malware
File Type:
PE
Threat name:
Win32.Dropper.HijackLoader
Status:
Malicious
First seen:
2024-11-14 18:53:12 UTC
File Type:
PE (Exe)
Extracted files:
38
AV detection:
14 of 24 (58.33%)
Threat level:
3/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
idatloader
finfisherrat
Result
Malware family:
n/a
Score:
7/10
Tags:
collection discovery spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
Browser Information Discovery
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads WinSCP keys stored on the system
Reads user/profile data of web browsers
Verdict:
Malicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
588cb61b36a001384a2833bd5df8d7982ca79d6ae17a3d83a94e01b1e79684bd
MD5 hash:
b84dfabe933d1160f624693d94779ce5
SHA1 hash:
ac0133c09708fe4a3c626e3ba4cdf44d3a0e065f
SH256 hash:
1758085a61527b427c4380f0c976d29a8bee889f2ac480c356a3f166433bf70e
MD5 hash:
75e78e4bf561031d39f86143753400ff
SHA1 hash:
324c2a99e39f8992459495182677e91656a05206
SH256 hash:
abe7cc92554b2defc6c336d5cafabe798f1f6c75076ccce897d6337fdbc42fd5
MD5 hash:
467e95c9a46987552925c47bc7b38916
SHA1 hash:
3732116b8ef5ee6094ea49a0658dcb7a7adb2634
Malware family:
HijackLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| COM_BASE_API | Can Download & Execute components | ole32.dll::CoCreateInstance ole32.dll::CreateStreamOnHGlobal |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteExW SHELL32.dll::ShellExecuteW SHELL32.dll::SHGetFileInfoW |
| WIN32_PROCESS_API | Can Create Process and Threads | KERNEL32.dll::CloseHandle KERNEL32.dll::CreateThread |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::LoadLibraryA KERNEL32.dll::GetDriveTypeW KERNEL32.dll::GetStartupInfoA KERNEL32.dll::GetDiskFreeSpaceExW KERNEL32.dll::GetCommandLineW |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CreateDirectoryW KERNEL32.dll::CreateFileW KERNEL32.dll::DeleteFileW KERNEL32.dll::GetSystemDirectoryW KERNEL32.dll::GetFileAttributesW KERNEL32.dll::FindFirstFileW |
| WIN_USER_API | Performs GUI Actions | USER32.dll::CreateWindowExW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.