MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c578d33e132ccbbc26a4a31e6054fea7f42591b391e9b8eb30eaf732ed119088. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 9


Intelligence 9 IOCs YARA 4 File information Comments

SHA256 hash: c578d33e132ccbbc26a4a31e6054fea7f42591b391e9b8eb30eaf732ed119088
SHA3-384 hash: 5b3ddada2358f92fffa677c8f5891f8a69a7f7ecf0ab3066a22deff08b17a838d204701508dee668bfd0f2d3440f46c0
SHA1 hash: 7d7d1e371a5d306e5250ae156ef0ac5615f6a882
MD5 hash: c1b68b83bfce6540b20b1a42e5fb5123
humanhash: blue-gee-table-xray
File name:New Order-PO 20-057.xlxs.exe
Download: download sample
Signature AsyncRAT
File size:2'552'832 bytes
First seen:2020-10-09 15:41:55 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'468 x Formbook, 12'206 x SnakeKeylogger)
ssdeep 49152:31bzgSdW5AAr0r5ZTIkaDOcYref54dRcVOBgrA:3Q4jAYQ4zc8Bv
Threatray 648 similar samples on MalwareBazaar
TLSH C4C5191A17E685D4CCF9F7760768619D23F1BDFB2B50921D6B0633688E320E7261E09E
Reporter abuse_ch
Tags:AsyncRAT exe RAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
117
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %AppData% directory
Launching cmd.exe command interpreter
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Creating a process from a recently created file
Creating a file in the Windows subdirectories
Running batch commands
Creating a file
Launching a process
Creating a file in the Program Files subdirectories
Unauthorized injection to a recently created process
Connection attempt to an infection source
Enabling autorun by creating a file
Unauthorized injection to a system process
Result
Threat name:
AsyncRAT Azorult
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Allocates memory in foreign processes
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected AntiVM_3
Yara detected AsyncRAT
Yara detected Azorult
Yara detected Azorult Info Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 295912 Sample: New Order-PO 20-057.xlxs.exe Startdate: 09/10/2020 Architecture: WINDOWS Score: 100 54 Yara detected Azorult 2->54 56 Yara detected AntiVM_3 2->56 58 Yara detected AsyncRAT 2->58 60 9 other signatures 2->60 10 New Order-PO 20-057.xlxs.exe 5 2->10         started        14 docx.exe 2->14         started        process3 file4 48 C:\Users\user\AppData\Roaming\ar001.exe, PE32 10->48 dropped 50 C:\Users\...50ew Order-PO 20-057.xlxs.exe.log, ASCII 10->50 dropped 74 Hides that the sample has been downloaded from the Internet (zone.identifier) 10->74 16 cmd.exe 1 10->16         started        76 Writes to foreign memory regions 14->76 78 Allocates memory in foreign processes 14->78 80 Injects a PE file into a foreign processes 14->80 18 InstallUtil.exe 14->18         started        20 InstallUtil.exe 14->20         started        22 InstallUtil.exe 14->22         started        24 5 other processes 14->24 signatures5 process6 process7 26 ar001.exe 2 16->26         started        29 conhost.exe 16->29         started        signatures8 70 Machine Learning detection for dropped file 26->70 72 Hides that the sample has been downloaded from the Internet (zone.identifier) 26->72 31 cmd.exe 1 26->31         started        33 cmd.exe 2 26->33         started        process9 file10 36 docx.exe 2 31->36         started        39 conhost.exe 31->39         started        46 C:\Users\user\AppData\Local\docx.exe, PE32 33->46 dropped 41 conhost.exe 33->41         started        process11 signatures12 62 Machine Learning detection for dropped file 36->62 64 Writes to foreign memory regions 36->64 66 Allocates memory in foreign processes 36->66 68 2 other signatures 36->68 43 InstallUtil.exe 2 36->43         started        process13 dnsIp14 52 185.244.30.121, 49759, 49760, 49761 DAVID_CRAIGGG Netherlands 43->52
Threat name:
ByteCode-MSIL.Trojan.Ymacco
Status:
Malicious
First seen:
2020-10-09 10:58:56 UTC
File Type:
PE (.Net Exe)
Extracted files:
21
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
azorult
Score:
  10/10
Tags:
rat family:asyncrat trojan infostealer family:azorult spyware
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops file in Program Files directory
Suspicious use of SetThreadContext
JavaScript code in executable
Drops startup file
Loads dropped DLL
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Executes dropped EXE
Async RAT payload
AsyncRat
Azorult
Malware Config
C2 Extraction:
http://fentuys.com/dcmlks/index.php
Unpacked files
SH256 hash:
c578d33e132ccbbc26a4a31e6054fea7f42591b391e9b8eb30eaf732ed119088
MD5 hash:
c1b68b83bfce6540b20b1a42e5fb5123
SHA1 hash:
7d7d1e371a5d306e5250ae156ef0ac5615f6a882
SH256 hash:
2e78f0ba1c93179c23234fbfd779077d3ca5bd3d263a90eb8f5dce05d355c366
MD5 hash:
de566e9813670fc364f1b8149a40a498
SHA1 hash:
29b74683fe56b9f00796a499f575caf6f08608c5
SH256 hash:
5886dbc91ebc7a1e9d6b72794eb0bed7403d060a322aec65a9269f52deb4ff46
MD5 hash:
773658b99d7e72b3b75b404c4afc1dec
SHA1 hash:
3938e9d73cdedf65c4a2ee321d6b6a35f62ddb3a
SH256 hash:
2d9b788c29ebf25c35261d8e8d4feda494c251b32fb7a710b42b1d8907671b1c
MD5 hash:
d7351e291ebc63cce849b67f03058cfe
SHA1 hash:
670c0320ab9b2f00dbf9999352c688c5dd537cb7
Detections:
win_azorult_g1 win_azorult_auto
SH256 hash:
2dd5d2febed2d88d5926c1b334ce43d0951f3f8a650f7ab7bc6d2df8a2e57e77
MD5 hash:
c572f7447536611311bbff57b2c205d3
SHA1 hash:
8e3057cd189d8292a7fe7e8195d23715c7e4385f
SH256 hash:
7db185b26885a19a82eefd7bfbdf2907d8fb8d9ad40d90afd6c459c390ef6b81
MD5 hash:
e2fee7c6aeaa03fb52050301327c2f7a
SHA1 hash:
d726bc2548d86b7b71735c611c72b491a1025847
SH256 hash:
46d3802acb6c708fcba3fa7b0432b362a06220c078e4a16c89b248022d753e72
MD5 hash:
2706c4174f7f3794cf3428823e8e452b
SHA1 hash:
9f135a396459c2ef6b501fd6a0ad66d683da7e24
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:asyncrat
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research
Rule name:Reverse_text_bin_mem
Author:James_inthe_box
Description:Reverse text detected
Rule name:win_asyncrat_j1
Author:Johannes Bader @viql
Description:detects AsyncRAT
Rule name:win_asyncrat_w0
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AsyncRAT

Executable exe c578d33e132ccbbc26a4a31e6054fea7f42591b391e9b8eb30eaf732ed119088

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments