MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b2ceb384528dd6048f4b1e92cc059ebdfd7c2936ea3c701f7bcfb928681c2443. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 11


Intelligence 11 IOCs YARA 5 File information Comments

SHA256 hash: b2ceb384528dd6048f4b1e92cc059ebdfd7c2936ea3c701f7bcfb928681c2443
SHA3-384 hash: 9e3e6a2c06882b1d62241ed1a71112a2c290852e97e4a72e665328c816a2f98027a3feae185868a9b0addba0091c3623
SHA1 hash: 234dbe3c2479a364c5d380c98a0530d0643cc894
MD5 hash: ee405f428580ebdf914211f196843a0b
humanhash: fish-ohio-coffee-early
File name:ISF 訂艙單 - KHH-TOLEDO(VIA NYC) SO6615→8152 WKH2406122.scr
Download: download sample
Signature AsyncRAT
File size:646'656 bytes
First seen:2024-10-09 08:34:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'738 x AgentTesla, 19'597 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 12288:Z2s40fVuJFsbedtglNi/WVGMBRRCdNWeN8TmEM:os4+QJFjrsQ4GMBRRkuSE
Threatray 1'055 similar samples on MalwareBazaar
TLSH T1EBD49D1476548F53CA79C7F83872E07053F85E6EA02AF2655DC17EEB79A2F008964E83
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter threatcat_ch
Tags:AsyncRAT exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
371
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
ISF 訂艙單 - KHH-TOLEDO(VIA NYC) SO6615→8152 WKH2406122.scr
Verdict:
No threats detected
Analysis date:
2024-10-09 08:36:52 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
Powershell Autorun Gumen
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Found malware configuration
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Generic Downloader
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1529723 Sample: ISF #U8a02#U8259#U55ae -  K... Startdate: 09/10/2024 Architecture: WINDOWS Score: 100 41 Multi AV Scanner detection for domain / URL 2->41 43 Suricata IDS alerts for network traffic 2->43 45 Found malware configuration 2->45 47 17 other signatures 2->47 8 ISF #U8a02#U8259#U55ae -  KHH-TOLEDO(VIA NYC)  SO6615#U21928152  WKH2406122.scr.exe 3 2->8         started        process3 file4 33 ISF #U8a02#U8259#U...2406122.scr.exe.log, ASCII 8->33 dropped 11 ISF #U8a02#U8259#U55ae -  KHH-TOLEDO(VIA NYC)  SO6615#U21928152  WKH2406122.scr.exe 6 8->11         started        process5 dnsIp6 37 104.250.180.178, 55060, 7061 M247GB United States 11->37 35 C:\Users\user\AppData\Roaming\XClient.exe, PE32 11->35 dropped 49 Adds a directory exclusion to Windows Defender 11->49 16 powershell.exe 23 11->16         started        19 powershell.exe 21 11->19         started        21 powershell.exe 23 11->21         started        23 powershell.exe 11->23         started        file7 signatures8 process9 signatures10 39 Loading BitLocker PowerShell Module 16->39 25 conhost.exe 16->25         started        27 conhost.exe 19->27         started        29 conhost.exe 21->29         started        31 conhost.exe 23->31         started        process11
Threat name:
ByteCode-MSIL.Trojan.SnakeKeylogger
Status:
Malicious
First seen:
2024-10-09 07:22:23 UTC
File Type:
PE (.Net Exe)
Extracted files:
29
AV detection:
23 of 37 (62.16%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
System Location Discovery: System Language Discovery
Verdict:
Malicious
Tags:
xworm asyncrat xworm
YARA:
n/a
Unpacked files
SH256 hash:
ff57bbd0fdc684ed0081786d06e4f13e786807d36805be88be2f65bbc2fbf554
MD5 hash:
f70c347e94362392dfee769e00d0a9a4
SHA1 hash:
f7bc0a6a399c53871afa99eaeae1c132e9422f07
Detections:
XWorm win_xworm_w0 MALWARE_Win_XWorm win_mal_XWorm INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA win_xworm_bytestring MALWARE_Win_AsyncRAT
SH256 hash:
8f202acc39375b6d338f157fb6f0e8d160809e1976f2dafdc8cdf7ac9d14eccf
MD5 hash:
eeaf8336b71c9c51b26c20bc78e1d983
SHA1 hash:
63605e9cf78a9bbb9952018da0a3bd245ccdf6be
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
682c261fcd08c676ef231f46eac1c054c8df17522846b9e4adbafb62e8482dab
MD5 hash:
5a6cead6de3340dd9e0b16d599e5d1f5
SHA1 hash:
00e25f93284ff0d2493c6df3a596891d0848399e
SH256 hash:
b2ceb384528dd6048f4b1e92cc059ebdfd7c2936ea3c701f7bcfb928681c2443
MD5 hash:
ee405f428580ebdf914211f196843a0b
SHA1 hash:
234dbe3c2479a364c5d380c98a0530d0643cc894
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AsyncRAT

Executable exe b2ceb384528dd6048f4b1e92cc059ebdfd7c2936ea3c701f7bcfb928681c2443

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments