MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b33b5465a7f01c9443846a5264a577f431578fb8f9b28e7f83535e2f855aaaa1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 11


Intelligence 11 IOCs YARA 5 File information Comments

SHA256 hash: b33b5465a7f01c9443846a5264a577f431578fb8f9b28e7f83535e2f855aaaa1
SHA3-384 hash: 8be47e7c88bf98c28a2f429cc15f7610e679dd0f5b07a4b0bc11f40aae58430364612c1f9530a7ecc6e66d7fc70b3f5b
SHA1 hash: ce9dcb31d0abbe310f2f0daed80a89e347564ce0
MD5 hash: 5e6736ab22eadaf231c54e4910f39199
humanhash: iowa-rugby-venus-lake
File name:PS03939484948940-09022021.exe
Download: download sample
Signature AsyncRAT
File size:1'143'808 bytes
First seen:2021-02-08 18:48:33 UTC
Last seen:2021-02-08 20:58:40 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'665 x AgentTesla, 19'478 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 6144:dYhtLMbUhGO3tTlUH4wDynDldODnFQg7Boj2RbCfm6Dm6fhiL+vfS:V
Threatray 588 similar samples on MalwareBazaar
TLSH 393562527E7B27B2F291E65822E19C7DF82F8302E055D7365688C14A5F0FC672827F98
Reporter abuse_ch
Tags:AsyncRAT exe nVpn RAT Yahoo


Avatar
abuse_ch
Malspam distributing AsyncRAT:

HELO: sonic308-30.consmr.mail.bf2.yahoo.com
Sending IP: 74.6.130.229
From: Human Resources LSP <lsp_hr@yahoo.com>
Subject: Fw: Invoice and payment
Attachment: PS03939484948940-09022021.r11 (contains "PS03939484948940-09022021.exe")

AsyncRAT C2:
sukura.duckdns.org:4723 (185.140.53.137)

Pointing to nVpn:

% Information related to '185.140.53.0 - 185.140.53.255'

% Abuse contact for '185.140.53.0 - 185.140.53.255' is 'abuse@privacyfirst.sh'

inetnum: 185.140.53.0 - 185.140.53.255
remarks: This prefix is assigned to The PRIVACYFIRST Project, which
remarks: operates infrastructure jointly used by various VPN service
remarks: providers. We have a very strong focus on privacy and freedom.
remarks: In case of abuse, we encourage all international law enforcement
remarks: agencies to get in touch with our abuse contact. Due to the fact
remarks: that we keep no logs of user activities and only share data when
remarks: it is legally required under our jurisdiction, it is very unlikely
remarks: for a demand of user information to be successful. Still, that
remarks: should not deter you from reaching out.
netname: PRIVACYFIRST-EU
country: EU
admin-c: TPP15-RIPE
tech-c: TPP15-RIPE
org: ORG-TPP6-RIPE
status: ASSIGNED PA
mnt-by: PRIVACYFIRST-MNT
created: 2016-10-17T23:24:00Z
last-modified: 2020-11-06T23:02:44Z
source: RIPE


Intelligence


File Origin
# of uploads :
2
# of downloads :
168
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
PS03939484948940-09022021.exe
Verdict:
Malicious activity
Analysis date:
2021-02-08 18:51:13 UTC
Tags:
trojan rat asyncrat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Unauthorized injection to a recently created process
Creating a file
DNS request
Using the Windows Management Instrumentation requests
Sending a UDP request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Sending a TCP request to an infection source
Enabling autorun by creating a file
Enabling autorun
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AsyncRAT
Detection:
malicious
Classification:
troj.adwa.evad
Score:
92 / 100
Signature
Creates an undocumented autostart registry key
Creates autostart registry keys with suspicious names
Creates multiple autostart registry keys
Drops PE files to the startup folder
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Yara detected AsyncRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 350110 Sample: PS03939484948940-09022021.exe Startdate: 08/02/2021 Architecture: WINDOWS Score: 92 49 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->49 51 Yara detected AsyncRAT 2->51 53 Machine Learning detection for sample 2->53 55 3 other signatures 2->55 7 PS03939484948940-09022021.exe 3 5 2->7         started        11 PS03939484948940-09022021.exe 2 2->11         started        13 PS03939484948940-09022021.exe 2 2->13         started        15 2 other processes 2->15 process3 file4 39 C:\Users\...\PS03939484948940-09022021.exe, PE32 7->39 dropped 41 PS03939484948940-0...exe:Zone.Identifier, ASCII 7->41 dropped 43 C:\...\PS03939484948940-09022021.exe.log, ASCII 7->43 dropped 63 Creates an undocumented autostart registry key 7->63 65 Drops PE files to the startup folder 7->65 67 Injects a PE file into a foreign processes 7->67 17 PS03939484948940-09022021.exe 2 7->17         started        20 PS03939484948940-09022021.exe 7->20         started        22 PS03939484948940-09022021.exe 11->22         started        25 PS03939484948940-09022021.exe 2 11->25         started        27 PS03939484948940-09022021.exe 11->27         started        29 PS03939484948940-09022021.exe 2 13->29         started        31 PS03939484948940-09022021.exe 2 15->31         started        33 PS03939484948940-09022021.exe 15->33         started        signatures5 process6 dnsIp7 45 sukura.duckdns.org 185.140.53.137, 4723, 49720 DAVID_CRAIGGG Sweden 17->45 47 192.168.2.1 unknown unknown 17->47 57 Creates autostart registry keys with suspicious names 22->57 59 Creates multiple autostart registry keys 22->59 61 Injects a PE file into a foreign processes 22->61 35 PS03939484948940-09022021.exe 25->35         started        37 PS03939484948940-09022021.exe 25->37         started        signatures8 process9
Threat name:
Win32.Spyware.Artemis
Status:
Malicious
First seen:
2021-02-08 18:49:07 UTC
AV detection:
18 of 29 (62.07%)
Threat level:
  2/5
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat persistence rat
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Drops startup file
Async RAT payload
AsyncRat
Modifies WinLogon for persistence
Malware Config
C2 Extraction:
sukura.duckdns.org:4723
Unpacked files
SH256 hash:
2cb75e5d70fd2a52acdcc558b2af0f97dcc6b60205092067990844f11ddc112f
MD5 hash:
2e1b0ff56432e4352e97905e2aa91a31
SHA1 hash:
e410a83c8be1c5ab68a263d1723bbf72e16e1e4b
Detections:
win_asyncrat_w0
SH256 hash:
66156d4a29fd29116fd10411a852ac6df6be3187f37ca8fa244d6ac9ea424795
MD5 hash:
791106dcf842e87651526707ce6ab741
SHA1 hash:
31b3d9c60775bc580d19158dcb31d45583aa5a1a
SH256 hash:
b33b5465a7f01c9443846a5264a577f431578fb8f9b28e7f83535e2f855aaaa1
MD5 hash:
5e6736ab22eadaf231c54e4910f39199
SHA1 hash:
ce9dcb31d0abbe310f2f0daed80a89e347564ce0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:asyncrat
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research
Rule name:INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse
Author:ditekSHen
Description:Detects file containing reversed ASEP Autorun registry keys
Rule name:Reverse_text_bin_mem
Author:James_inthe_box
Description:Reverse text detected
Rule name:win_asyncrat_j1
Author:Johannes Bader @viql
Description:detects AsyncRAT
Rule name:win_asyncrat_w0
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

0e3203078ba3538b8882750f4bd5c3bd

AsyncRAT

Executable exe b33b5465a7f01c9443846a5264a577f431578fb8f9b28e7f83535e2f855aaaa1

(this sample)

  
Dropped by
MD5 0e3203078ba3538b8882750f4bd5c3bd
  
Delivery method
Distributed via e-mail attachment

Comments