MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bba9f40b22002ac5336810d1044d24ed0294038899eb86b10caa180fbd76855e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 14


Intelligence 14 IOCs YARA 12 File information Comments

SHA256 hash: bba9f40b22002ac5336810d1044d24ed0294038899eb86b10caa180fbd76855e
SHA3-384 hash: f23f328b9ecaa27f9c7b945778053635a058899d2bdbc72ae95e8475c4e599f4c68be7c530812481d39c1da4990c1c20
SHA1 hash: 8471e9189f85738286094df6d388b28d9f5c4ad5
MD5 hash: cd97d457208e415c56a389fb3ef5f21c
humanhash: cardinal-bravo-hamper-october
File name:z30PO1028930.exe
Download: download sample
Signature AsyncRAT
File size:529'408 bytes
First seen:2023-11-28 09:57:17 UTC
Last seen:2023-11-28 11:24:50 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'650 x AgentTesla, 19'462 x Formbook, 12'203 x SnakeKeylogger)
ssdeep 12288:F067saD1GCdvPsFTD14cGn39EFBFasQmbCpv:F06ipm79EFba5
TLSH T1E4B4125436AD9B42E1BEA3F769A5601107B1349BA476F2389FC226EF5836F404B10F1F
TrID 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.0% (.EXE) Win64 Executable (generic) (10523/12/4)
6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.2% (.EXE) Win32 Executable (generic) (4505/5/1)
1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Reporter FXOLabs
Tags:AsyncRAT exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
329
Origin country :
BR BR
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Searching for synchronization primitives
Creating a window
Creating a process with a hidden window
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Creating a file in the %AppData% subdirectories
Using the Windows Management Instrumentation requests
Creating a file in the %AppData% directory
Creating a file in the %temp% directory
Running batch commands
Launching a process
Creating a process from a recently created file
Adding an exclusion to Microsoft Defender
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
ModernLoader
Verdict:
Malicious
Result
Threat name:
AsyncRAT, StormKitty, VenomRAT
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
Contains functionality to log keystrokes (.Net Source)
Downloads suspicious files via Chrome
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Capture Wi-Fi password
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Mail credentials (via file / registry access)
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected AsyncRAT
Yara detected BrowserPasswordDump
Yara detected StormKitty Stealer
Yara detected VenomRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1349175 Sample: z30PO1028930.exe Startdate: 28/11/2023 Architecture: WINDOWS Score: 100 120 sni1gl.wpc.nucdn.net 2->120 122 scdn1f005.wpc.ad629.nucdn.net 2->122 124 6 other IPs or domains 2->124 150 Snort IDS alert for network traffic 2->150 152 Multi AV Scanner detection for domain / URL 2->152 154 Found malware configuration 2->154 156 21 other signatures 2->156 13 z30PO1028930.exe 3 2->13         started        16 msedge.exe 2->16         started        19 Host Process.exe 4 2->19         started        21 explorer.exe 2->21         started        signatures3 process4 file5 174 Adds a directory exclusion to Windows Defender 13->174 176 Queries memory information (via WMI often done to detect virtual machines) 13->176 178 Injects a PE file into a foreign processes 13->178 23 z30PO1028930.exe 9 13->23         started        26 powershell.exe 23 13->26         started        28 conhost.exe 13->28         started        104 C:\Users\user\AppData\...\content_new.js, Unicode 16->104 dropped 106 C:\Users\user\AppData\Local\...\content.js, Unicode 16->106 dropped 108 C:\Users\user\...\service_worker_bin_prod.js, ASCII 16->108 dropped 110 3 other files (2 malicious) 16->110 dropped 30 msedge.exe 16->30         started        33 powershell.exe 19->33         started        35 Host Process.exe 19->35         started        signatures6 process7 dnsIp8 112 C:\Users\user\AppData\...\Host Process.exe, PE32 23->112 dropped 37 cmd.exe 1 23->37         started        39 cmd.exe 1 23->39         started        42 conhost.exe 26->42         started        144 18.165.83.79 MIT-GATEWAYSUS United States 30->144 146 13.107.246.40 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 30->146 148 25 other IPs or domains 30->148 44 conhost.exe 33->44         started        file9 process10 signatures11 46 Host Process.exe 37->46         started        49 conhost.exe 37->49         started        51 timeout.exe 1 37->51         started        160 Uses schtasks.exe or at.exe to add and modify task schedules 39->160 162 Uses netsh to modify the Windows network and firewall settings 39->162 164 Tries to harvest and steal WLAN passwords 39->164 53 conhost.exe 39->53         started        55 schtasks.exe 1 39->55         started        process12 signatures13 180 Adds a directory exclusion to Windows Defender 46->180 182 Injects a PE file into a foreign processes 46->182 57 Host Process.exe 46->57         started        62 powershell.exe 46->62         started        64 Host Process.exe 46->64         started        66 2 other processes 46->66 process14 dnsIp15 138 91.92.244.203, 4449, 49704, 49717 THEZONEBG Bulgaria 57->138 140 ip-api.com 208.95.112.1, 49722, 80 TUT-ASUS United States 57->140 142 3 other IPs or domains 57->142 114 C:\Users\user\AppData\...\ZIPXYXWIOY.docx, ASCII 57->114 dropped 116 C:\Users\user\AppData\...116YMMPCEIMA.docx, ASCII 57->116 dropped 118 C:\Users\user\AppData\...\CZQKSDDMWR.xlsx, ASCII 57->118 dropped 166 Tries to steal Mail credentials (via file / registry access) 57->166 168 Found many strings related to Crypto-Wallets (likely being stolen) 57->168 170 Tries to harvest and steal browser information (history, passwords, etc) 57->170 172 4 other signatures 57->172 68 cmd.exe 57->68         started        71 cvtres.exe 57->71         started        74 cmd.exe 57->74         started        76 explorer.exe 57->76         started        78 conhost.exe 62->78         started        file16 signatures17 process18 dnsIp19 158 Tries to harvest and steal WLAN passwords 68->158 80 conhost.exe 68->80         started        82 chcp.com 68->82         started        84 netsh.exe 68->84         started        86 findstr.exe 68->86         started        132 ipinfo.io 34.117.59.81 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 71->132 88 chrome.exe 71->88         started        91 msedge.exe 71->91         started        93 conhost.exe 71->93         started        95 conhost.exe 74->95         started        97 2 other processes 74->97 signatures20 process21 dnsIp22 134 192.168.2.7, 443, 4449, 49698 unknown unknown 88->134 136 239.255.255.250 unknown Reserved 88->136 99 chrome.exe 88->99         started        102 msedge.exe 91->102         started        process23 dnsIp24 126 142.251.16.102 GOOGLEUS United States 99->126 128 googlehosted.l.googleusercontent.com 142.251.167.132 GOOGLEUS United States 99->128 130 8 other IPs or domains 99->130
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-11-28 08:20:08 UTC
File Type:
PE (.Net Exe)
Extracted files:
12
AV detection:
19 of 23 (82.61%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat botnet:default rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Checks computer location settings
Async RAT payload
AsyncRat
Malware Config
C2 Extraction:
91.92.244.203:4449
Unpacked files
SH256 hash:
9b4782435f360ecc5faeb31e402c8ec44057a57b28073419aa8379a3c33c2c93
MD5 hash:
ccd0bcc6cc01923e5ddf4ba72fc8fa12
SHA1 hash:
f2d4bd262aa5a6e2cf439488c1cae3968ab8d34a
SH256 hash:
4c6935114333a9a521b5561d723aff629d824ec7a78217824c129c05a2525a7c
MD5 hash:
090a428b5c68b1d164d6b60d1e934e4b
SHA1 hash:
ddc83ef6925026937b1bab8c2b1ddf4049700364
SH256 hash:
2a0290a662e89a81ed2d9c73e54a0aeba209fc36617f134cf0aaa74690db47db
MD5 hash:
4820945deb84d6bd26460e8a6ba0c622
SHA1 hash:
c519540ad21594fa45fcc2e6e15cfbea8b3449b9
SH256 hash:
2ebb8810fba9b498b04c7e2fc63e18b5400f5bd7e088ff04aa8e4879147bea0f
MD5 hash:
c0fb23aad0956e7ff0b0062f319f904d
SHA1 hash:
c2798285a621c797131bc970505acc41a11ed773
Detections:
VenomRat win_asyncrat_unobfuscated INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice
SH256 hash:
bba9f40b22002ac5336810d1044d24ed0294038899eb86b10caa180fbd76855e
MD5 hash:
cd97d457208e415c56a389fb3ef5f21c
SHA1 hash:
8471e9189f85738286094df6d388b28d9f5c4ad5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AgentTesla_DIFF_Common_Strings_01
Author:schmidtsz
Description:Identify partial Agent Tesla strings
Rule name:INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice
Author:ditekSHen
Description:Detects executables attemping to enumerate video devices using WMI
Rule name:MAL_AsnycRAT
Author:SECUINFRA Falcon Team
Description:Detects AsnycRAT based on it's config decryption routine
Rule name:MAL_AsyncRAT_Config_Decryption
Author:SECUINFRA Falcon Team
Description:Detects AsnycRAT based on it's config decryption routine
Rule name:Multifamily_RAT_Detection
Author:Lucas Acha (http://www.lukeacha.com)
Description:Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:Njrat
Author:botherder https://github.com/botherder
Description:Njrat
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_DOTNET_PE_List_AV
Author:SECUINFRA Falcon Team
Description:Detecs .NET Binary that lists installed AVs

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AsyncRAT

Executable exe bba9f40b22002ac5336810d1044d24ed0294038899eb86b10caa180fbd76855e

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments