MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b38f89519205f6183c4ce10141cbfd77aeb5406153a5440537a33a591d64e37d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 12


Intelligence 12 IOCs YARA 1 File information Comments

SHA256 hash: b38f89519205f6183c4ce10141cbfd77aeb5406153a5440537a33a591d64e37d
SHA3-384 hash: f0fb326f3cf91b609c0b66345303d99a087e5152ee0a0cbaf0a85216a79b2d9b15d98e8f0a470fbe9336647ae68a3842
SHA1 hash: 9157ae69b2bb045bad06480afbc6fd7886beda59
MD5 hash: b4d08697b7de193a675e9f2aff4a25f4
humanhash: nitrogen-mockingbird-mississippi-bacon
File name:YBQOFHCX.msi
Download: download sample
Signature AsyncRAT
File size:3'047'424 bytes
First seen:2025-05-19 20:03:06 UTC
Last seen:2025-05-20 06:54:53 UTC
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 49152:yTKDlDCxpeqh2x/SNE0n94y23134fE7qXXEHJNrQskzPD4SA1AolFWdU:yTyDCxpeHZTNWSJXkvgAoyO
Threatray 124 similar samples on MalwareBazaar
TLSH T1A1E5335AF8A176B2EC47D8FB0787815AE65BFE28A33478CC5184F0DD15BE7C44A42B42
TrID 88.4% (.MST) Windows SDK Setup Transform script (61000/1/5)
11.5% (.) Generic OLE2 / Multistream Compound (8000/1)
Magika msi
Reporter juroots
Tags:77-223-119-85 AsyncRAT booking edgeburst-sbs FakeCaptcha msi


Avatar
juroots
https://confirm-id10[.]click/ -> https://edgeburst[.]sbs/YBQOFHCX.msi

Intelligence


File Origin
# of uploads :
2
# of downloads :
129
Origin country :
CH CH
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
installer wix
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AsyncRAT, DcRat
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Contains functionality to capture screen (.Net source)
Contains functionality to log keystrokes (.Net Source)
Drops PE files to the user root directory
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found malware configuration
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Sample uses string decryption to hide its real strings
Sigma detected: Drops script at startup location
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Yara detected AsyncRAT
Yara detected Costura Assembly Loader
Yara detected DcRat
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1694306 Sample: YBQOFHCX.msi Startdate: 19/05/2025 Architecture: WINDOWS Score: 100 73 Suricata IDS alerts for network traffic 2->73 75 Found malware configuration 2->75 77 Malicious sample detected (through community Yara rule) 2->77 79 11 other signatures 2->79 10 msiexec.exe 80 40 2->10         started        13 LogicD.exe 5 2->13         started        16 msiexec.exe 3 2->16         started        process3 file4 55 C:\Users\user\AppData\...\vcruntime140.dll, PE32 10->55 dropped 57 C:\Users\user\AppData\...\msvcp140.dll, PE32 10->57 dropped 59 C:\Users\user\AppData\Roaming\...\LogicD.exe, PE32 10->59 dropped 61 C:\Users\user\AppData\...\DuiLib_u.dll, PE32 10->61 dropped 18 LogicD.exe 7 10->18         started        63 C:\Users\user\AppData\Local\...D6EEDE.tmp, PE32 13->63 dropped 95 Injects code into the Windows Explorer (explorer.exe) 13->95 97 Modifies the context of a thread in another process (thread injection) 13->97 99 Maps a DLL or memory area into another process 13->99 22 tcpvcon64.exe 1 13->22         started        24 PlanExplorer.exe 3 13->24         started        signatures5 process6 file7 47 C:\ProgramData\ctDocker\LogicD.exe, PE32 18->47 dropped 49 C:\ProgramData\ctDocker\vcruntime140.dll, PE32 18->49 dropped 51 C:\ProgramData\ctDocker\msvcp140.dll, PE32 18->51 dropped 53 C:\ProgramData\ctDocker\DuiLib_u.dll, PE32 18->53 dropped 85 Switches to a custom stack to bypass stack traces 18->85 26 LogicD.exe 7 18->26         started        30 conhost.exe 22->30         started        signatures8 process9 file10 65 C:\Users\user\PlanExplorer.exe, PE32 26->65 dropped 67 C:\Users\user\AppData\...\tcpvcon64.exe, PE32+ 26->67 dropped 69 C:\Users\user\AppData\Local\...\D454A8F.tmp, PE32 26->69 dropped 87 Injects code into the Windows Explorer (explorer.exe) 26->87 89 Drops PE files to the user root directory 26->89 91 Modifies the context of a thread in another process (thread injection) 26->91 93 4 other signatures 26->93 32 PlanExplorer.exe 3 26->32         started        37 tcpvcon64.exe 3 26->37         started        signatures11 process12 dnsIp13 71 77.223.119.85, 1414, 49691 EKAT-ASRU Russian Federation 32->71 45 C:\Users\user\AppData\...\DeleteApp.url, MS 32->45 dropped 81 Switches to a custom stack to bypass stack traces 32->81 83 Found direct / indirect Syscall (likely to bypass EDR) 32->83 39 WMIC.exe 1 32->39         started        41 conhost.exe 37->41         started        file14 signatures15 process16 process17 43 conhost.exe 39->43         started       
Threat name:
Binary.Trojan.Rugmi
Status:
Malicious
First seen:
2025-05-19 15:18:16 UTC
File Type:
Binary (Archive)
Extracted files:
23
AV detection:
12 of 24 (50.00%)
Threat level:
  5/5
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat botnet:default discovery persistence privilege_escalation rat
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
Event Triggered Execution: Installer Packages
System Location Discovery: System Language Discovery
Drops file in Windows directory
Executes dropped EXE
Loads dropped DLL
Suspicious use of SetThreadContext
Enumerates connected drives
Drops startup file
Async RAT payload
AsyncRat
Asyncrat family
Malware Config
C2 Extraction:
77.223.119.85:1414
Malware family:
IDATLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Distributed via drive-by

Comments