MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b2064c9af50ac66d478011d5c176ff5329f32f4c3e20aadd0c78950d7e078849. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: b2064c9af50ac66d478011d5c176ff5329f32f4c3e20aadd0c78950d7e078849
SHA3-384 hash: 2335f100fa461f8c1c2706f020ab260caaad92c7eabdc2f035185cea9582845e1750d0495db1b30b75f671836bf5ad5b
SHA1 hash: 1e655905ef25684bb5713f829c9396fb209f962e
MD5 hash: a388ed77c723379ca9c6a13b2c53547e
humanhash: early-blue-spaghetti-glucose
File name:Invoice 20394 - Packing List 3921.html.z
Download: download sample
Signature AsyncRAT
File size:820'256 bytes
First seen:2020-06-24 05:48:54 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 24576:y0hRoQt+kmC18Lg7Q05fyf8swMxdsloFQYcaVDd5:VMQtZz1XE241xeo6y
TLSH 9C05334272CFB68DCD49C81FE213DB2F8506C9A874E4D5B9A4EE23FA5276F50ED24460
Reporter abuse_ch
Tags:AsyncRAT RAT Yahoo z


Avatar
abuse_ch
Malspam distributing AsyncRAT:

HELO: sonic303-31.consmr.mail.bf2.yahoo.com
Sending IP: 74.6.131.230
From: citramina4 <citramina4@yahoo.com>
Reply-To: citramina4 <citramina4@yahoo.com>
Subject: 回复: INVOICE & PACKING LIST / C-6815 / MAD190000096
Attachment: Invoice 20394 - Packing List 3921.html.z (contains "Invoice #20394 - Packing List #3921.exe")

AsyncRAT C2:
79.134.225.82:54280

Hosted on nVpn:

% Information related to '79.134.225.64 - 79.134.225.127'

% Abuse contact for '79.134.225.64 - 79.134.225.127' is 'abuse@your-vpn.network'

inetnum: 79.134.225.64 - 79.134.225.127
netname: YOUR_VPN_NETWORK
country: DE
remarks: ****************************************************
remarks: This subnet belongs to a VPN service provider.
remarks: We protect the right to privacy, which means
remarks: we don't log the activities of our users.
remarks: ****************************************************
admin-c: EH4074-RIPE
tech-c: YVN10-RIPE
status: ASSIGNED PA
abuse-c: YVN10-RIPE
org: ORG-YVN1-RIPE
mnt-by: AF15-MNT
created: 2019-07-19T18:26:38Z
last-modified: 2019-07-19T18:51:28Z
source: RIPE

Intelligence


File Origin
# of uploads :
1
# of downloads :
76
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.Nanocore
Status:
Malicious
First seen:
2020-06-24 05:50:07 UTC
AV detection:
27 of 48 (56.25%)
Threat level:
  2/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AsyncRAT

zip b2064c9af50ac66d478011d5c176ff5329f32f4c3e20aadd0c78950d7e078849

(this sample)

  
Dropping
AsyncRAT
  
Delivery method
Distributed via e-mail attachment

Comments