MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 aed50a5da5a71dbee227b9de4c9ee68ec20e9814928b16fb231784c3d45ef4a2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: aed50a5da5a71dbee227b9de4c9ee68ec20e9814928b16fb231784c3d45ef4a2
SHA3-384 hash: d0ca11173efd32caa603f975cd6388ab6484095fbbfb065050ac76cc406023216ecef55520478fe5dd83bb95959240a2
SHA1 hash: fe8d8ebc03e50c39b3c38b6f9aad6e9ea6894528
MD5 hash: 02d3b46db023e74bf34b36d336e283d8
humanhash: mississippi-blue-purple-pip
File name:believe-server.txt.ps1
Download: download sample
Signature AsyncRAT
File size:261'674 bytes
First seen:2022-10-14 07:21:59 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 6144:wRQRmeIR/ENCsO4/TzhUtZylDwc00ddPqWBYWUaOU8Y85TNkS:SX4PhU1cFPqWt987SS
Threatray 2'792 similar samples on MalwareBazaar
TLSH T1F544E05E0CE67DACD388427F2601512647EC7D37D48BB0689283E0FB19B3E7669349AD
Reporter 0xToxin
Tags:185.222.58.50 AsyncRAT Bitbucket NEW pro2pro ps1

Intelligence


File Origin
# of uploads :
1
# of downloads :
285
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Result
Threat name:
AsyncRAT, PhoenixRAT
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Bypasses PowerShell execution policy
Creates processes via WMI
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
PowerShell case anomaly found
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses cmd line tools excessively to alter registry or file data
Writes to foreign memory regions
Yara detected AsyncRAT
Yara detected Bypass AMSI
Yara detected PhoenixRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 723152 Sample: believe-server.txt.ps1 Startdate: 14/10/2022 Architecture: WINDOWS Score: 100 69 Snort IDS alert for network traffic 2->69 71 Malicious sample detected (through community Yara rule) 2->71 73 Yara detected PhoenixRAT 2->73 75 5 other signatures 2->75 9 powershell.exe 7 2->9         started        11 powershell.exe 2->11         started        13 powershell.exe 25 2->13         started        17 wscript.exe 2->17         started        process3 file4 19 cmd.exe 2 9->19         started        22 conhost.exe 9->22         started        24 cmd.exe 11->24         started        26 conhost.exe 11->26         started        57 C:\ProgramData\...\RUCXFGHJUCVOFVUZVIPNCG.ps1, ASCII 13->57 dropped 59 C:\ProgramData\...\JZKPPKGTHBOIPSRKOCOKSH.ps1, ASCII 13->59 dropped 61 C:\ProgramData\...\JZKPPKGTHBOIPSRKOCOKSH.bat, DOS 13->61 dropped 81 Bypasses PowerShell execution policy 13->81 28 powershell.exe 34 13->28         started        30 conhost.exe 13->30         started        signatures5 process6 signatures7 77 Uses cmd line tools excessively to alter registry or file data 19->77 79 PowerShell case anomaly found 19->79 32 cmd.exe 1 19->32         started        35 reg.exe 1 1 19->35         started        37 reg.exe 1 1 19->37         started        39 cmd.exe 24->39         started        41 reg.exe 24->41         started        43 reg.exe 24->43         started        45 wscript.exe 28->45         started        process8 signatures9 65 PowerShell case anomaly found 32->65 47 powershell.exe 11 32->47         started        50 powershell.exe 39->50         started        67 Creates processes via WMI 45->67 process10 signatures11 83 Writes to foreign memory regions 47->83 85 Injects a PE file into a foreign processes 47->85 52 aspnet_compiler.exe 2 47->52         started        55 aspnet_compiler.exe 50->55         started        process12 dnsIp13 63 185.222.58.50, 4545, 49703 ROOTLAYERNETNL Netherlands 52->63
Threat name:
Script-WScript.Downloader.Heuristic
Status:
Malicious
First seen:
2022-10-14 07:22:13 UTC
File Type:
Text (PowerShell)
AV detection:
4 of 42 (9.52%)
Threat level:
  2/5
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat botnet:new persistence rat
Behaviour
Modifies registry class
Modifies registry key
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops file in System32 directory
Suspicious use of SetThreadContext
Registers COM server for autorun
Async RAT payload
AsyncRat
Process spawned unexpected child process
Malware Config
C2 Extraction:
185.222.58.50:4545
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments