MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c11314504d04b9714c1c3992ca673486a5c8ac96b60fbc892b2f94204296b606. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 15


Intelligence 15 IOCs YARA 16 File information Comments

SHA256 hash: c11314504d04b9714c1c3992ca673486a5c8ac96b60fbc892b2f94204296b606
SHA3-384 hash: e01957c893e33c87577b10dd68e79d737cf433c1a0e038262f0b4d71e17ed760ec788fbb3ad0f13e9c1e3fbfe2bec205
SHA1 hash: 27770fa35ea2ca6e1cd87f669e21f5e29cfaa381
MD5 hash: e94abe514202de0a3e24c0f45ccea8a6
humanhash: blossom-two-tennessee-steak
File name:Eclipse.exe
Download: download sample
Signature AsyncRAT
File size:12'683'776 bytes
First seen:2024-02-06 21:32:33 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d59a4a699610169663a929d37c90be43 (75 x DCRat, 22 x njrat, 15 x SalatStealer)
ssdeep 196608:bI14Cek0gfc3haxZH+fiE1jlKkbSPSvFWuFBGFV42uL7e:bKekhfcuZH+XKgHFW+BGFVE7e
TLSH T1F1D6BE137285D925CC3541F104A2D7B05EB19C18A9298BB73AD8BE7BFBF12C67A053D2
TrID 53.3% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
13.1% (.EXE) Win32 Executable Delphi generic (14182/79/4)
12.1% (.SCR) Windows screen saver (13097/50/3)
9.7% (.EXE) Win64 Executable (generic) (10523/12/4)
4.1% (.EXE) Win32 Executable (generic) (4504/4/1)
File icon (PE):PE icon
dhash icon b070f0bc9cc0f030 (2 x AsyncRAT)
Reporter bobross_malware2
Tags:AsyncRAT exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
348
Origin country :
US US
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
Eclipse RAT.rar
Verdict:
Malicious activity
Analysis date:
2024-01-15 15:20:08 UTC
Tags:
stealer redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm anti-vm aspnet_compiler cmd cmstp darkkomet dllhost explorer fingerprint lolbin lolbin msbuild netsh packed packed redline regasm regedit regsvcs remote runonce schtasks shell32 stealer vbc
Result
Verdict:
MALICIOUS
Malware family:
FlashDevelop
Verdict:
Malicious
Result
Threat name:
AsyncRAT, PureLog Stealer, RHADAMANTHYS,
Detection:
malicious
Classification:
troj.adwa.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Checks if the current machine is a virtual machine (disk enumeration)
Drops PE files to the startup folder
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected AntiVM3
Yara detected AsyncRAT
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected RHADAMANTHYS Stealer
Yara detected RUNPE
Yara detected UAC Bypass using CMSTP
Yara detected XWorm
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1387875 Sample: Eclipse.exe Startdate: 06/02/2024 Architecture: WINDOWS Score: 100 51 Snort IDS alert for network traffic 2->51 53 Found malware configuration 2->53 55 Malicious sample detected (through community Yara rule) 2->55 57 18 other signatures 2->57 8 Eclipse.exe 3 2->8         started        12 qemu-ga.exe 2->12         started        process3 file4 31 C:\Users\user\AppData\Local\Temp\build.exe, Unknown 8->31 dropped 33 C:\Users\user\AppData\Local\...clipse.exe, Unknown 8->33 dropped 65 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->65 14 build.exe 7 8->14         started        19 Eclipse.exe 2 8->19         started        signatures5 process6 dnsIp7 39 45.15.156.127, 23000, 49732 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 14->39 35 C:\Users\user\AppData\Roaming\...\qemu-ga.exe, PE32 14->35 dropped 41 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 14->41 43 Machine Learning detection for dropped file 14->43 45 Found many strings related to Crypto-Wallets (likely being stolen) 14->45 49 4 other signatures 14->49 21 qemu-ga.exe 14->21         started        24 conhost.exe 14->24         started        37 C:\Users\user\AppData\Local\Temp\main.exe, PE32 19->37 dropped 47 Antivirus detection for dropped file 19->47 26 main.exe 1 19->26         started        file8 signatures9 process10 signatures11 59 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 21->59 61 Antivirus detection for dropped file 26->61 63 Multi AV Scanner detection for dropped file 26->63 28 dialer.exe 26->28         started        process12 signatures13 67 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 28->67 69 Checks if the current machine is a virtual machine (disk enumeration) 28->69
Threat name:
Win32.Trojan.XWormRAT
Status:
Malicious
First seen:
2024-01-13 23:40:32 UTC
File Type:
PE (Exe)
Extracted files:
413
AV detection:
24 of 24 (100.00%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:zgrat discovery infostealer rat spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Detect ZGRat V1
RedLine
RedLine payload
ZGRat
Unpacked files
SH256 hash:
eece4a517158baafc941a212f76737046bcaad254910d864446173e735279c2e
MD5 hash:
b220ad1800a1ef06b230895be473c923
SHA1 hash:
cb8136873064ee344098b8bc4173d81abc8c9e09
Detections:
redline MALWARE_Win_zgRAT
SH256 hash:
a5f5d652e2682b0162924b23b509bace21566526b6ac0d44e2a273e3a77440f4
MD5 hash:
e1990fe52ec2c952b28350a8f1c1689e
SHA1 hash:
2fd088c787de7573337cb533d275d8d9fb56c644
Detections:
INDICATOR_SUSPICIOUS_EXE_TelegramChatBot INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA INDICATOR_SUSPICIOUS_EXE_RawPaste_URL MALWARE_Win_AsyncRAT
SH256 hash:
03c72cfabace07b6787d2d1fd66d6d6d9a2fbcb74a827ca4ab7e59aba40cb306
MD5 hash:
e1e28c3acf184aa364c9ed9a30ab7289
SHA1 hash:
1a173a6f4ec39fe467f1b4b91c9fad794167ac1c
SH256 hash:
03b982f0558cd6c3c3a48697f7ad6a5a938410545f60e63be67c03a74619ba70
MD5 hash:
35c6f3397cace892a6be7c8ca42a6232
SHA1 hash:
8e4756fa78c686e300b0a633582a90613c80104e
SH256 hash:
c11314504d04b9714c1c3992ca673486a5c8ac96b60fbc892b2f94204296b606
MD5 hash:
e94abe514202de0a3e24c0f45ccea8a6
SHA1 hash:
27770fa35ea2ca6e1cd87f669e21f5e29cfaa381
Detections:
INDICATOR_SUSPICIOUS_EXE_TelegramChatBot INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA INDICATOR_SUSPICIOUS_EXE_RawPaste_URL MALWARE_Win_AsyncRAT
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Base64_decoding
Author:iam-py-test
Description:Detect scripts which are decoding base64 encoded data (mainly Python, may apply to other languages)
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Author:ditekSHen
Description:Detects Windows executables referencing non-Windows User-Agents
Rule name:INDICATOR_SUSPICIOUS_EXE_RawPaste_URL
Author:ditekSHen
Description:Detects executables (downlaoders) containing URLs to raw contents of a paste
Rule name:INDICATOR_SUSPICIOUS_EXE_TelegramChatBot
Author:ditekSHen
Description:Detects executables using Telegram Chat Bot
Rule name:Jupyter_infostealer
Author:CD_R0M_
Description:Rule for Jupyter Infostealer/Solarmarker malware from september 2021-December 2022
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MALWARE_Win_AsyncRAT
Author:ditekSHen
Description:Detects AsyncRAT
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:QbotStuff
Author:anonymous
Rule name:SUSP_OneNote
Author:spatronn
Description:Hard-Detect One
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:Windows_Trojan_Xworm_732e6c12
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments