MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bee2f5826c2c9b007cdb52973f723a89f249db49735e073bde3fb9d194069bce. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 14


Intelligence 14 IOCs 1 YARA 2 File information Comments

SHA256 hash: bee2f5826c2c9b007cdb52973f723a89f249db49735e073bde3fb9d194069bce
SHA3-384 hash: fdf981a5d2bcfc10239b67c7af6837a5286ba0ca5388cc5c8ae13790efd51a48db5a1fd6b0d94ea3c121f77b246e6318
SHA1 hash: 4691958efeb1a7fb37a88fad674aa0227d2407d4
MD5 hash: 7f735eabf725a20caaf64d3607237084
humanhash: virginia-nineteen-east-foxtrot
File name:general march order list.pdf.exe
Download: download sample
Signature AsyncRAT
File size:925'184 bytes
First seen:2022-03-14 05:46:08 UTC
Last seen:2022-03-14 08:05:40 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'741 x AgentTesla, 19'604 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 24576:yrRJRUSjJoY2o4v4nBgeWOwD2cFcWVMoy+x:yrRHvjyFjv4B/02cA
Threatray 8'346 similar samples on MalwareBazaar
TLSH T195157DE06B08567FEEB1237AC1B915313EB61D4AA895FF28578D32C90973F8E09D241D
Reporter abuse_ch
Tags:AsyncRAT exe RAT


Avatar
abuse_ch
AsyncRAT C2:
194.31.98.58:2405

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
194.31.98.58:2405 https://threatfox.abuse.ch/ioc/395086/

Intelligence


File Origin
# of uploads :
2
# of downloads :
235
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file in the %temp% directory
Launching a process
Running batch commands
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
obfuscated packed replace.exe update.exe
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AsyncRAT
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Initial sample is a PE file and has a suspicious name
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Add Scheduled Task From User AppData Temp
Sigma detected: Suspicious Double Extension
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected AsyncRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 588285 Sample: general march order list.pdf.exe Startdate: 14/03/2022 Architecture: WINDOWS Score: 100 61 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->61 63 Malicious sample detected (through community Yara rule) 2->63 65 Multi AV Scanner detection for dropped file 2->65 67 12 other signatures 2->67 10 general march order list.pdf.exe 7 2->10         started        process3 file4 51 C:\Users\user\AppData\...\aFPtEYjzkm.exe, PE32 10->51 dropped 53 C:\Users\user\AppData\Local\...\tmp9A9E.tmp, XML 10->53 dropped 55 C:\...\general march order list.pdf.exe.log, ASCII 10->55 dropped 69 Adds a directory exclusion to Windows Defender 10->69 14 general march order list.pdf.exe 6 10->14         started        17 powershell.exe 23 10->17         started        19 schtasks.exe 1 10->19         started        signatures5 process6 file7 57 C:\Users\user\AppData\Roaming\Adobe.exe, PE32 14->57 dropped 21 cmd.exe 1 14->21         started        23 cmd.exe 1 14->23         started        25 conhost.exe 17->25         started        27 conhost.exe 19->27         started        process8 process9 29 Adobe.exe 5 21->29         started        32 conhost.exe 21->32         started        34 timeout.exe 1 21->34         started        36 conhost.exe 23->36         started        38 schtasks.exe 1 23->38         started        signatures10 71 Multi AV Scanner detection for dropped file 29->71 73 Adds a directory exclusion to Windows Defender 29->73 40 Adobe.exe 29->40         started        43 powershell.exe 29->43         started        45 schtasks.exe 29->45         started        process11 dnsIp12 59 primetoolz.duckdns.org 194.31.98.58, 2405, 49795 BURSABILTR Netherlands 40->59 47 conhost.exe 43->47         started        49 conhost.exe 45->49         started        process13
Threat name:
ByteCode-MSIL.Trojan.AgenteslaPacker
Status:
Malicious
First seen:
2022-03-14 05:47:10 UTC
File Type:
PE (.Net Exe)
Extracted files:
13
AV detection:
22 of 27 (81.48%)
Threat level:
  5/5
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat botnet:default rat
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
.NET Reactor proctector
Async RAT payload
AsyncRat
Malware Config
C2 Extraction:
primetoolz.duckdns.org:2405
Unpacked files
SH256 hash:
e107de0e0b124f92a88e437a647c9a14e9527e9c5492e7f86e075fe6ede203af
MD5 hash:
d93a79ef76c867732356441107ac10ba
SHA1 hash:
ac8f5a11c9dfdeea61fcc28647bc76deeaa3d98f
SH256 hash:
8795f87ddd61b651c06d64a0295bafb10e269840abc85789120ddc2f8f7db1f9
MD5 hash:
7bd6fef36f0be106e9440ae931340996
SHA1 hash:
5e1769cb52439c8aed94cacaa57fa7f77b69a2d3
SH256 hash:
e0757a45b174d1a4f89d6d2684da9da1c4f41bb6defd7b3cf6bfd3f2a5cc6262
MD5 hash:
6bb01c3472b8219e86f02c371eae1690
SHA1 hash:
303b56709a390b715f9a489f6f678c4e6ad25967
Detections:
win_asyncrat_w0
SH256 hash:
9b00e2fa33ad72dec22a5e107ab6886da72bbe0bed89a721e877c1dc3ce6a662
MD5 hash:
b4c9c16228f0ee1de70ffc6264fb720c
SHA1 hash:
437049e452a511e220abdb32df695cdf07f5a7d0
SH256 hash:
bee2f5826c2c9b007cdb52973f723a89f249db49735e073bde3fb9d194069bce
MD5 hash:
7f735eabf725a20caaf64d3607237084
SHA1 hash:
4691958efeb1a7fb37a88fad674aa0227d2407d4
Malware family:
AsyncRAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments