MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 be9703e011388f04e7ac8b7178f523d95cd101865398b9ec871222367615f7a3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 8


Intelligence 8 IOCs YARA 19 File information Comments

SHA256 hash: be9703e011388f04e7ac8b7178f523d95cd101865398b9ec871222367615f7a3
SHA3-384 hash: f71d270af03225cc9a8276fafd6cdb4b98a0922ca875501d695b45b2db2f0a604c93c61a04d72c82489862422bb19b1c
SHA1 hash: 11e1a1ffb0c0fb3df23562b1ab343cca10e43bc6
MD5 hash: 0531ac101f5baa7b6c54b0cae890a060
humanhash: item-single-mountain-queen
File name:omic.zip
Download: download sample
Signature AsyncRAT
File size:12'974'066 bytes
First seen:2025-12-28 07:40:37 UTC
Last seen:2025-12-28 16:48:05 UTC
File type: zip
MIME type:application/zip
ssdeep 393216:i2pqPYVfhLoiGuDeV1u9EBmbQNbn6IMs+5g:i2pw0dowePu9EBCsV
TLSH T1FED63342D75D1465F220053A815AD524BEC6869331035F7DFE44FCA2BA3E1824FFEEAA
Magika zip
Reporter JAMESWT_WT
Tags:2bknb-com 2vbkb-com AsyncRAT booking setkapls77-com zip

Intelligence


File Origin
# of uploads :
2
# of downloads :
117
Origin country :
IT IT
File Archive Information

This file archive contains 20 file(s), sorted by their relevance:

File name:wxmsw32u_core_gcc_custom.dll
File size:5'291'008 bytes
SHA256 hash: 2e681ab8f0907453efff16c6ba2d06cfe5efde800ea6268bd5b574806a3c4ff0
MD5 hash: 23ee6e74759136e495fb8cae9d127823
MIME type:application/x-dosexec
Signature AsyncRAT
File name:libstdc++-6.dll
File size:2'279'936 bytes
SHA256 hash: 2586bbbca788de5f99b9242a27702baf0ffeb2e02a79340a7639f45459af9b34
MD5 hash: b0a5b027d0093acfb91a1e7ea00bb152
MIME type:application/x-dosexec
Signature AsyncRAT
File name:libgmp-10.dll
File size:649'216 bytes
SHA256 hash: 5e234d4bf81ad73dfe342b687a5e6c591688ebd09aab4eb216306d6a935efeb3
MD5 hash: d747093f789b69936f996d0e77077a05
MIME type:application/x-dosexec
Signature AsyncRAT
File name:wxmsw32u_xrc_gcc_custom.dll
File size:814'080 bytes
SHA256 hash: a276817ae582bb8b20922088156e90fec7351cf643a365e5a924c8f15c4dfb39
MD5 hash: 21c15a394c05108868267b1d74ee6b43
MIME type:application/x-dosexec
Signature AsyncRAT
File name:libpng16-16.dll
File size:240'128 bytes
SHA256 hash: c3fec619d6e4265889cac85da28e74c995fe7edb06ce6e55384b44b9c073c3c4
MD5 hash: 3f6cd43cc2ed9c69f6d7e692648146d6
MIME type:application/x-dosexec
Signature AsyncRAT
File name:libgcc_s_seh-1.dll
File size:160'256 bytes
SHA256 hash: e0be5a5f91843d117b0b42d42605061611482406a4e8be3f42ec9a42cf0cfcf7
MD5 hash: 079c3e1d59e261e51395415a4a8375c4
MIME type:application/x-dosexec
Signature AsyncRAT
File name:wxbase32u_gcc_custom.dll
File size:1'887'232 bytes
SHA256 hash: d468646cbc406563abda20e8dc19583bd68c1f71bc844c469c1e7ad2a449f668
MD5 hash: d699131fa9a9eec0a94fde508be45c52
MIME type:application/x-dosexec
Signature AsyncRAT
File name:filezilla.exe
File size:4'328'448 bytes
SHA256 hash: 34cc44587089222e09a105494a175191b99061ceccb265389cf58b58f35a0da3
MD5 hash: 6a240a69d27a16daeddde7f71665b2a3
MIME type:application/x-dosexec
Signature AsyncRAT
File name:libfilezilla-50.dll
File size:1'048'064 bytes
SHA256 hash: 9d3c63954a2599739c169908f6369e6a3ec7fcbb5ef4748b42af433d0f41aee8
MD5 hash: 99fdf6df4e103cb51bd718d3c16b937d
MIME type:application/x-dosexec
Signature AsyncRAT
File name:libfzclient-commonui-private-3-69-5_core.dll
File size:639'488 bytes
SHA256 hash: 5b99655eb55d3c97b9f6a9a376f3b4abdba7182ab5b1bb1ef7e1269af7e26475
MD5 hash: 34824eeb1a95a1212cc8a49333079b5d
MIME type:application/x-dosexec
Signature AsyncRAT
File name:libsqlite3-0.dll
File size:1'278'464 bytes
SHA256 hash: e74a2b8f591f5f05858d188a629269f5b6f76b1dc67486ab4d3ffccbc9e98f28
MD5 hash: 4a75505e22d9f93e00897aa8b092c3d8
MIME type:application/x-dosexec
Signature AsyncRAT
File name:libgnutls-30.dll
File size:2'166'272 bytes
SHA256 hash: c2f1b95e91109c527cb9a87f22c017f73a5ccf3cb6c481aaea0a7cbaf754e3db
MD5 hash: 5c4282ce63466cb85895246e211faabb
MIME type:application/x-dosexec
Signature AsyncRAT
File name:libfzclient-private-3-69-5.dll
File size:1'457'664 bytes
SHA256 hash: 449a8dd70f0850fec570a3b69fe2eeaef35a54d8d0e1ac231a6c357cb631ae1b
MD5 hash: 1e065839b54d88602a2c954b09fc28a5
MIME type:application/x-dosexec
Signature AsyncRAT
File name:libhogweed-6.dll
File size:275'968 bytes
SHA256 hash: 8a28b6c508ad1e5dc9d041b07b66ad2929adcbb76eb91fdca5958e2245f15668
MD5 hash: 956a134f61bfcfb1f925086198b3ad0b
MIME type:application/x-dosexec
Signature AsyncRAT
File name:wxmsw32u_aui_gcc_custom.dll
File size:522'752 bytes
SHA256 hash: 565104e5b2e1740dd4f1214d8cba1c650591f3b9a5ac3c7d19eece68ac8ae56a
MD5 hash: 3218a211aec51885d9669f5b56a817c6
MIME type:application/x-dosexec
Signature AsyncRAT
File name:libfzclient-commonui-private-3-69-5_core
File size:1'995'776 bytes
SHA256 hash: 001f7df8c05bfc66423a92026f3168c730fd53e69f2c7d0ea90642f186066169
MD5 hash: 86c9aa9ce0c03493af99c522f5b19d73
MIME type:application/x-dosexec
Signature AsyncRAT
File name:zlib1.dll
File size:144'896 bytes
SHA256 hash: c111d4a8788299fa13abffd126b5679d7bb2e771a419d7f599dd73c2ec1abc92
MD5 hash: 18ab93562077b567182d8a21fe8e0a27
MIME type:application/x-dosexec
Signature AsyncRAT
File name:wxbase32u_xml_gcc_custom.dll
File size:245'760 bytes
SHA256 hash: bee0be08d36f2e1cf80877f036264a59a0f1a9e45ea3344259a935a85b811d7c
MD5 hash: f66121d593647cbb626ac43c3f709599
MIME type:application/x-dosexec
Signature AsyncRAT
File name:libnettle-8.dll
File size:330'240 bytes
SHA256 hash: 13b735c30eb0ff11e48e0be08b0167a53741aaf2f38a8a5f94bf7c94f02ebe8f
MD5 hash: 3825bea1490810d5e3206a78f6ed0f36
MIME type:application/x-dosexec
Signature AsyncRAT
File name:libfzclient-commonui-private-3-69-5.dll
File size:4'713'984 bytes
SHA256 hash: c2035fc7f36342d03d4a48a4e114d959b33179a0a5a0369154f7108a3860bb73
MD5 hash: 6de947b0a88e1c0a63ba033d6d907b29
MIME type:application/x-dosexec
Signature AsyncRAT
Vendor Threat Intelligence
Verdict:
Malicious
Score:
70%
Tags:
injection obfusc crypt
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Unknown
File Type:
zip
First seen:
2025-12-27T15:25:00Z UTC
Last seen:
2025-12-27T15:34:00Z UTC
Hits:
~10
Gathering data
Threat name:
Win64.Trojan.Etset
Status:
Malicious
First seen:
2025-12-27 19:55:38 UTC
File Type:
Binary (Archive)
Extracted files:
31
AV detection:
14 of 36 (38.89%)
Threat level:
  5/5
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat botnet:default defense_evasion discovery execution persistence rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Launches sc.exe
Suspicious use of SetThreadContext
Creates new service(s)
Drops startup file
Stops running service(s)
AsyncRat
Asyncrat family
Malware Config
C2 Extraction:
setkapls77.com:4455
setkapls88.com:4455
setkapls99.com:4455
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__MemoryWorkingSet
Author:Fernando Mercês
Description:Anti-debug process memory working set size check
Reference:http://www.gironsec.com/blog/2015/06/anti-debugger-trick-quicky/
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:NET
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AsyncRAT

zip be9703e011388f04e7ac8b7178f523d95cd101865398b9ec871222367615f7a3

(this sample)

  
Delivery method
Distributed via web download

Comments