MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c4952d905a0fb0466d45a58606635f0a2ac3b7c5cbb7e517118a9b695e3012e2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: c4952d905a0fb0466d45a58606635f0a2ac3b7c5cbb7e517118a9b695e3012e2
SHA3-384 hash: 149a12cbb3fc6fbb5a665838458c1f6546e0493eb2160712d3080edc1704bf425ee7193b43db0cb3bfaec7712d7e0fc8
SHA1 hash: 076910f57161d1f204733a7274da9713d19bdf2d
MD5 hash: 3dfb8b993505908b1b66861909a997c1
humanhash: freddie-eight-beryllium-winter
File name:in.bat
Download: download sample
Signature AsyncRAT
File size:50'646 bytes
First seen:2023-01-15 10:17:02 UTC
Last seen:Never
File type:Batch (bat) bat
MIME type:text/x-msdos-batch
ssdeep 768:NNIVZB47JMKBhWiQEQg68Jj4HJ9eT3R9KfofAQ0Mxs9XjVMC+GY0A51vj2h:SsMAhh1K3gRYwfb00+jV5YDvj2h
Threatray 2'820 similar samples on MalwareBazaar
TLSH T1FE33CFEE7B92DFDD0EA9EA3E984BFD5445A2C52F0B58A1E875C1B18DFD400E057840A3
Reporter 0xToxin
Tags:AsyncRAT bat genekol-nsupdate-info mulla2022-hopto-org PerceptionPoint remcos


Avatar
0xToxin
Download URL:
https://transfer.sh/Hzjb6F/in.bat

Intelligence


File Origin
# of uploads :
1
# of downloads :
143
Origin country :
IL IL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
in.bat
Verdict:
Malicious activity
Analysis date:
2023-01-15 10:19:38 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
UNKNOWN
Result
Threat name:
AsyncRAT, DBatLoader, Remcos
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
DLL side loading technique detected
Drops executables to the windows directory (C:\Windows) and starts them
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Renames powershell.exe to bypass HIPS
Snort IDS alert for network traffic
Suspicious powershell command line found
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected AsyncRAT
Yara detected DBatLoader
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 784598 Sample: in.bat Startdate: 15/01/2023 Architecture: WINDOWS Score: 100 120 Snort IDS alert for network traffic 2->120 122 Multi AV Scanner detection for domain / URL 2->122 124 Malicious sample detected (through community Yara rule) 2->124 126 6 other signatures 2->126 14 cmd.exe 2 2->14         started        18 Rtwgfxbl.exe 2->18         started        process3 dnsIp4 88 C:\Users\user\Desktop\in.bat.exe, PE32+ 14->88 dropped 150 Suspicious powershell command line found 14->150 152 Bypasses PowerShell execution policy 14->152 154 Adds a directory exclusion to Windows Defender 14->154 156 Renames powershell.exe to bypass HIPS 14->156 21 in.bat.exe 1 19 14->21         started        25 conhost.exe 14->25         started        94 uodt4q.am.files.1drv.com 18->94 96 onedrive.live.com 18->96 98 am-files.fe.1drv.com 18->98 158 Writes to foreign memory regions 18->158 160 Allocates memory in foreign processes 18->160 162 Creates a thread in another existing process (thread injection) 18->162 164 Injects a PE file into a foreign processes 18->164 27 iexpress.exe 18->27         started        file5 signatures6 process7 dnsIp8 100 mulla2022.hopto.org 185.176.220.29, 49703, 49710, 49711 LV-2CLOUD-ASN16LV Latvia 21->100 102 mulla2.mywire.org 21->102 104 2 other IPs or domains 21->104 78 C:\Users\user\AppData\Local\Temp\onjfeo.exe, PE32 21->78 dropped 80 C:\Users\user\AppData\Local\Temp\atneyn.exe, PE32 21->80 dropped 29 cmd.exe 1 21->29         started        32 cmd.exe 1 21->32         started        34 WerFault.exe 27->34         started        file9 process10 signatures11 140 Suspicious powershell command line found 29->140 36 powershell.exe 10 29->36         started        38 conhost.exe 29->38         started        40 powershell.exe 10 32->40         started        42 conhost.exe 32->42         started        process12 process13 44 onjfeo.exe 20 36->44         started        49 atneyn.exe 1 17 40->49         started        dnsIp14 106 uodt4q.am.files.1drv.com 44->106 108 onedrive.live.com 44->108 110 am-files.fe.1drv.com 44->110 82 C:\Users\Public\Libraries\netutils.dll, PE32+ 44->82 dropped 84 C:\Users\Public\Libraries\Rtwgfxbl.exe, PE32 44->84 dropped 86 C:\Users\Public\Libraries\easinvoker.exe, PE32+ 44->86 dropped 142 Writes to foreign memory regions 44->142 144 Allocates memory in foreign processes 44->144 146 Creates a thread in another existing process (thread injection) 44->146 148 Injects a PE file into a foreign processes 44->148 51 cmd.exe 44->51         started        54 iexpress.exe 44->54         started        112 uodt4q.am.files.1drv.com 49->112 114 onedrive.live.com 49->114 116 am-files.fe.1drv.com 49->116 56 WerFault.exe 49->56         started        file15 signatures16 process17 signatures18 128 Uses ping.exe to sleep 51->128 130 Drops executables to the windows directory (C:\Windows) and starts them 51->130 132 Uses ping.exe to check the status of other devices and networks 51->132 58 easinvoker.exe 51->58         started        60 PING.EXE 51->60         started        63 xcopy.exe 51->63         started        66 6 other processes 51->66 process19 dnsIp20 68 cmd.exe 58->68         started        118 127.0.0.1 unknown unknown 60->118 90 C:\Windows \System32\easinvoker.exe, PE32+ 63->90 dropped 92 C:\Windows \System32\netutils.dll, PE32+ 66->92 dropped file21 process22 signatures23 134 Suspicious powershell command line found 68->134 136 Adds a directory exclusion to Windows Defender 68->136 71 powershell.exe 68->71         started        74 conhost.exe 68->74         started        process24 signatures25 138 DLL side loading technique detected 71->138 76 conhost.exe 71->76         started        process26
Result
Malware family:
Score:
  10/10
Tags:
family:asyncrat family:modiloader family:remcos botnet:remotehost collection persistence rat trojan
Behaviour
Enumerates system info in registry
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Accesses Microsoft Outlook accounts
Adds Run key to start application
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
ModiLoader Second Stage
NirSoft MailPassView
NirSoft WebBrowserPassView
Nirsoft
AsyncRat
ModiLoader, DBatLoader
Remcos
Malware Config
C2 Extraction:
hendersonk1.hopto.org:2404
henderson1.camdvr.org:2404
centplus1.serveftp.com:2404
harrywlike.ddns.net:2404
genekol.nsupdate.info:2404
harrywlike1.ddns.net:2404
hendersonk2022.hopto.org:2404
genekol1.nsupdate.info:2404
generem.camdvr.org:2404
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AsyncRAT

Batch (bat) bat c4952d905a0fb0466d45a58606635f0a2ac3b7c5cbb7e517118a9b695e3012e2

(this sample)

  
Delivery method
Distributed via web download

Comments