MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c6441d3e239de8baafd6bb59c11f8fdd18955c75720441f4970494ab11e579e0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: c6441d3e239de8baafd6bb59c11f8fdd18955c75720441f4970494ab11e579e0
SHA3-384 hash: eedc49082c623c92caadf17149205ed52238964ec2ade0489d07df3b2fba13d09c1aa68f197f6be326be9008ba488b91
SHA1 hash: 24e689cbc39433eddcfe679c9651cda6a7bf42ed
MD5 hash: b444577fcd5b2700747b84e0df60d98e
humanhash: fourteen-blossom-island-september
File name:invoice-3087414.bat
Download: download sample
Signature AsyncRAT
File size:22'151 bytes
First seen:2023-01-24 08:13:11 UTC
Last seen:Never
File type:Batch (bat) bat
MIME type:text/plain
ssdeep 384:+/rpB7noIKVZabNB/rpB7noIKVZabNm/rpB7noIKVZabNDVQa1Wl/rpB7noIKVZx:+b7noIKCb/b7noIKCbEb7noIKCb/zkl8
Threatray 4'890 similar samples on MalwareBazaar
TLSH T15DA27DF0CB2D7BB2BE8D44096D7C3E2D5FB2FD22613880CB35692497272069957F1826
Reporter abuse_ch
Tags:AsyncRAT bat

Intelligence


File Origin
# of uploads :
1
# of downloads :
111
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
invoice-3087414.bat
Verdict:
No threats detected
Analysis date:
2023-01-24 08:16:02 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
76 / 100
Signature
Bypasses PowerShell execution policy
Malicious sample detected (through community Yara rule)
Sigma detected: Powershell Download and Execute IEX
Snort IDS alert for network traffic
Uses schtasks.exe or at.exe to add and modify task schedules
Wscript starts Powershell (via cmd or directly)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 790459 Sample: invoice-3087414.bat Startdate: 24/01/2023 Architecture: WINDOWS Score: 76 64 Snort IDS alert for network traffic 2->64 66 Malicious sample detected (through community Yara rule) 2->66 68 Sigma detected: Powershell Download and Execute IEX 2->68 10 cmd.exe 1 2->10         started        13 wscript.exe 1 2->13         started        15 wscript.exe 2->15         started        17 2 other processes 2->17 process3 signatures4 74 Wscript starts Powershell (via cmd or directly) 10->74 19 cmd.exe 1 10->19         started        22 conhost.exe 10->22         started        24 powershell.exe 11 13->24         started        26 powershell.exe 15->26         started        28 powershell.exe 17->28         started        30 powershell.exe 17->30         started        process5 signatures6 72 Wscript starts Powershell (via cmd or directly) 19->72 32 powershell.exe 17 21 19->32         started        37 conhost.exe 24->37         started        39 conhost.exe 26->39         started        41 conhost.exe 28->41         started        43 conhost.exe 30->43         started        process7 dnsIp8 62 nucleus.goodwood.com 172.104.40.185, 443, 49699 LINODE-APLinodeLLCUS United States 32->62 56 C:\Users\Public\Music\install.ps1, ASCII 32->56 dropped 58 C:\Users\Public\Music\Report.ps1, ASCII 32->58 dropped 60 C:\Users\Public\Music\Loader.vbs, ASCII 32->60 dropped 70 Uses schtasks.exe or at.exe to add and modify task schedules 32->70 45 wscript.exe 1 32->45         started        file9 signatures10 process11 signatures12 76 Wscript starts Powershell (via cmd or directly) 45->76 78 Bypasses PowerShell execution policy 45->78 48 powershell.exe 12 45->48         started        process13 process14 50 conhost.exe 48->50         started        52 schtasks.exe 1 48->52         started        54 schtasks.exe 1 48->54         started       
Gathering data
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat botnet:(((l12max))) rat
Behaviour
Creates scheduled task(s)
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Blocklisted process makes network request
Async RAT payload
AsyncRat
Malware Config
C2 Extraction:
formenn.linkpc.net:5555
formenn.linkpc.net:6666
hema55.publicvm.com:5555
hema55.publicvm.com:6666
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments