MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cd706f1f829de6745dbbbd89ee6297eacd015b18d2705dfa0ff89b6f9290467a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 9


Intelligence 9 IOCs 3 YARA 15 File information Comments

SHA256 hash: cd706f1f829de6745dbbbd89ee6297eacd015b18d2705dfa0ff89b6f9290467a
SHA3-384 hash: 9d69c68669485dfcaadddddcd72bccfcb5e7089a7109354a5d32ac1ff57a88716b922fb96d5e30586d5e8baa3447acd0
SHA1 hash: d56fe98044662b21b12e716b340c5b74ca5c5e4b
MD5 hash: 1b76fa2e5d3e1a4f55ba0bb9eb8728a1
humanhash: equal-cat-mike-eleven
File name:1B76FA2E5D3E1A4F55BA0BB9EB8728A1.exe
Download: download sample
Signature AsyncRAT
File size:1'076'224 bytes
First seen:2021-06-01 00:56:40 UTC
Last seen:2021-06-01 01:45:39 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 24576:JpwUZO8sLkWUqfmSe27gNMoG3kY+T0SkxUbOm24Nr:JpwioZmSVcNMF3OT0lUOm2
Threatray 281 similar samples on MalwareBazaar
TLSH 4835231473AB2711C5AC0578D0EA6D84A3F9AF8CD233D28B2CE9D65ABF1C3624D71B54
Reporter abuse_ch
Tags:AsyncRAT exe RAT


Avatar
abuse_ch
AsyncRAT C2:
89.182.123.92:3601

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
89.182.123.92:3601 https://threatfox.abuse.ch/ioc/68203/
89.182.123.92:3604 https://threatfox.abuse.ch/ioc/68204/
87.132.215.23:4250 https://threatfox.abuse.ch/ioc/68205/

Intelligence


File Origin
# of uploads :
2
# of downloads :
156
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
1B76FA2E5D3E1A4F55BA0BB9EB8728A1.exe
Verdict:
No threats detected
Analysis date:
2021-06-01 00:59:52 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Sending a UDP request
Creating a process with a hidden window
Launching a service
Deleting a recently created file
Launching a process
Creating a file in the Windows subdirectories
Unauthorized injection to a recently created process
Adding exclusions to Windows Defender
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AsyncRAT Njrat
Detection:
malicious
Classification:
troj.adwa.evad
Score:
100 / 100
Signature
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Creates an autostart registry key pointing to binary in C:\Windows
Creates multiple autostart registry keys
Drops PE files to the startup folder
Drops PE files with benign system names
Found malware configuration
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Powershell adding suspicious path to exclusion list
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Yara detected AsyncRAT
Yara detected Njrat
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 427303 Sample: EA7IKi1qaJ.exe Startdate: 01/06/2021 Architecture: WINDOWS Score: 100 88 dontreachme5.ddns.net 2->88 90 dontreachme1.duckdns.org 2->90 92 2 other IPs or domains 2->92 96 Found malware configuration 2->96 98 Malicious sample detected (through community Yara rule) 2->98 100 Antivirus / Scanner detection for submitted sample 2->100 102 11 other signatures 2->102 9 EA7IKi1qaJ.exe 7 2->9         started        12 svchost.exe 1 2->12         started        signatures3 process4 file5 62 C:\Users\user\AppData\Local\Temp\Sthz.exe, PE32 9->62 dropped 64 C:\Users\user\AppData\...\Qlbuwbpsqf.exe, PE32 9->64 dropped 66 C:\Users\user\AppData\Local\...kpldojge.exe, PE32 9->66 dropped 68 C:\Users\user\AppData\...A7IKi1qaJ.exe.log, ASCII 9->68 dropped 14 Sthz.exe 4 9 9->14         started        18 Qlbuwbpsqf.exe 9 9 9->18         started        20 Ekpldojge.exe 3 9 9->20         started        process6 file7 70 C:\Windows\Resources\Themes\...\svchost.exe, PE32 14->70 dropped 72 7Wa3tbeb04Gaz1bBq5...5ef1dPd84w5x5c1.exe, PE32 14->72 dropped 74 C:\Users\user\AppData\...\AdvancedRun.exe, PE32 14->74 dropped 104 Multi AV Scanner detection for dropped file 14->104 106 Machine Learning detection for dropped file 14->106 108 Creates multiple autostart registry keys 14->108 110 Creates an autostart registry key pointing to binary in C:\Windows 14->110 22 AdvancedRun.exe 14->22         started        76 C:\...\6D50xbBfc1c8am56Raeyfd90ah8fEwc.exe, PE32 18->76 dropped 78 C:\Users\Public\Documents\...\svchost.exe, PE32 18->78 dropped 80 C:\Users\user\AppData\...\AdvancedRun.exe, PE32 18->80 dropped 112 Drops PE files to the startup folder 18->112 114 Adds a directory exclusion to Windows Defender 18->114 116 Tries to delay execution (extensive OutputDebugStringW loop) 18->116 24 AdvancedRun.exe 18->24         started        27 powershell.exe 18->27         started        29 powershell.exe 18->29         started        37 4 other processes 18->37 82 C:\Windows\Resources\Themes\...\svchost.exe, PE32 20->82 dropped 84 C:\Users\...\aw9e7zI9aa1f8fH2dbde4F19a4if.exe, PE32 20->84 dropped 86 C:\Users\user\AppData\...\AdvancedRun.exe, PE32 20->86 dropped 118 Hides threads from debuggers 20->118 120 Drops PE files with benign system names 20->120 31 AdvancedRun.exe 20->31         started        33 powershell.exe 20->33         started        35 powershell.exe 20->35         started        40 2 other processes 20->40 signatures8 process9 dnsIp10 42 AdvancedRun.exe 22->42         started        94 192.168.2.1 unknown unknown 24->94 44 AdvancedRun.exe 24->44         started        46 conhost.exe 27->46         started        48 conhost.exe 29->48         started        50 AdvancedRun.exe 31->50         started        52 conhost.exe 33->52         started        54 conhost.exe 35->54         started        60 C:\Users\user\AppData\...\AdvancedRun.exe, PE32 37->60 dropped 58 3 other processes 37->58 56 conhost.exe 40->56         started        file11 process12
Threat name:
ByteCode-MSIL.Backdoor.Bladabhindi
Status:
Malicious
First seen:
2021-05-27 18:16:43 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
21 of 28 (75.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion trojan
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Drops startup file
Loads dropped DLL
Windows security modification
Executes dropped EXE
Nirsoft
Modifies Windows Defender Real-time Protection settings
Turns off Windows Defender SpyNet reporting
Windows security bypass
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:asyncrat
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research
Rule name:CAP_HookExKeylogger
Author:Brian C. Bell -- @biebsmalwareguy
Reference:https://github.com/DFIRnotes/rules/blob/master/CAP_HookExKeylogger.yar
Rule name:CN_disclosed_20180208_c
Author:Florian Roth
Description:Detects malware from disclosed CN malware set
Reference:https://twitter.com/cyberintproject/status/961714165550342146
Rule name:INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse
Author:ditekSHen
Description:Detects file containing reversed ASEP Autorun registry keys
Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer
Author:ditekSHen
Description:detects Windows exceutables potentially bypassing UAC using eventvwr.exe
Rule name:MALWARE_Win_NjRAT
Author:ditekSHen
Description:Detects NjRAT / Bladabindi
Rule name:Njrat
Author:JPCERT/CC Incident Response Group
Description:detect njRAT in memory
Rule name:pe_imphash
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:Reverse_text_bin_mem
Author:James_inthe_box
Description:Reverse text detected
Rule name:Select_from_enumeration
Author:James_inthe_box
Description:IP and port combo
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:win_asyncrat_j1
Author:Johannes Bader @viql
Description:detects AsyncRAT
Rule name:win_asyncrat_w0
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research
Rule name:win_njrat_w1
Author:Brian Wallace @botnet_hunter <bwall@ballastsecurity.net>
Description:Identify njRat

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments