MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 e1e6a513abf55583458cd88ec8b7af9ce2a60d169526b0e6a31183a7688b8480. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AsyncRAT
Vendor detections: 15
| SHA256 hash: | e1e6a513abf55583458cd88ec8b7af9ce2a60d169526b0e6a31183a7688b8480 |
|---|---|
| SHA3-384 hash: | 9c31cf040146c10a6197c531465a216eac52a80da485c91710fa75a445ce2ce996108bd5ab101c62caa7771e988ffb4e |
| SHA1 hash: | 30f6fa21f06d99b0254fa1ff387c45921317eda7 |
| MD5 hash: | d2b8506820fe3c39b6b5e891170f3451 |
| humanhash: | echo-stairway-robert-kilo |
| File name: | e1e6a513abf55583458cd88ec8b7af9ce2a60d169526b0e6a31183a7688b8480 |
| Download: | download sample |
| Signature | AsyncRAT |
| File size: | 778'752 bytes |
| First seen: | 2025-01-10 14:47:14 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'750 x AgentTesla, 19'653 x Formbook, 12'248 x SnakeKeylogger) |
| ssdeep | 12288:YjlIpHtMPku+l0CPPoJts5Pic17D44ehsA4iFMZUiqrbA8yJNB:YjlIhSPd+pWtAPic17Dehx442B |
| TLSH | T1BCF4BFC07B26B701CD6CB570852AEEB8625C2F68700879F27EEE374775B9152AA1CF05 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | 863b292b234d2b96 (7 x RedLineStealer, 3 x AsyncRAT, 1 x Formbook) |
| Reporter | |
| Tags: | AsyncRAT exe |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Behaviour
Result
Behaviour
Malware Config
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6331768257:AAE1Rrc3F4A-nTJkfXEukNBriTate8i72L8/sendMessage?chat_id=5287158069
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | asyncrat |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect AsyncRat in memory |
| Reference: | internal research |
| Rule name: | AsyncRAT_kingrat |
|---|---|
| Author: | jeFF0Falltrades |
| Rule name: | DebuggerCheck__RemoteAPI |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | Detect_PowerShell_Obfuscation |
|---|---|
| Author: | daniyyell |
| Description: | Detects obfuscated PowerShell commands commonly used in malicious scripts. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse |
|---|---|
| Author: | ditekSHen |
| Description: | Detects file containing reversed ASEP Autorun registry keys |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_CC_Regex |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing credit card regular expressions |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Discord_Regex |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing Discord tokens regular expressions |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_RawPaste_URL |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables (downlaoders) containing URLs to raw contents of a paste |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_VPN |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many VPN software clients. Observed in infosteslers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing Windows vault credential objects. Observed in infostealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_WirelessNetReccon |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with interest in wireless interface using netsh |
| Rule name: | malware_asyncrat |
|---|---|
| Description: | detect AsyncRat in memory |
| Reference: | https://github.com/NYAN-x-CAT/AsyncRAT-C-Sharp |
| Rule name: | MALWARE_Win_Multi_Family_InfoStealer |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Prynt, WorldWind, DarkEye, Stealerium and ToxicEye / TelegramRAT infostealers |
| Rule name: | MALWARE_Win_StormKitty |
|---|---|
| Author: | ditekSHen |
| Description: | Detects StormKitty infostealer |
| Rule name: | MALWARE_Win_WorldWind |
|---|---|
| Author: | ditekSHen |
| Description: | Detects WorldWind infostealer |
| Rule name: | MAL_AsnycRAT |
|---|---|
| Author: | SECUINFRA Falcon Team |
| Description: | Detects AsnycRAT based on it's config decryption routine |
| Rule name: | MAL_AsyncRAT_Config_Decryption |
|---|---|
| Author: | SECUINFRA Falcon Team |
| Description: | Detects AsnycRAT based on it's config decryption routine |
| Rule name: | msil_suspicious_use_of_strreverse |
|---|---|
| Author: | dr4k0nia |
| Description: | Detects mixed use of Microsoft.CSharp and VisualBasic to use StrReverse |
| Rule name: | Multifamily_RAT_Detection |
|---|---|
| Author: | Lucas Acha (http://www.lukeacha.com) |
| Description: | Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | Njrat |
|---|---|
| Author: | botherder https://github.com/botherder |
| Description: | Njrat |
| Rule name: | pe_imphash |
|---|
| Rule name: | prynt_stealer |
|---|---|
| Author: | Nikos 'n0t' Totosis |
| Description: | Prynt Stealer Payload |
| Rule name: | RansomPyShield_Antiransomware |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Suspicious String and Import combination that Ransomware mostly abuse(can create FP) |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | SUSP_DOTNET_PE_List_AV |
|---|---|
| Author: | SECUINFRA Falcon Team |
| Description: | Detecs .NET Binary that lists installed AVs |
| Rule name: | SUSP_NET_Msil_Suspicious_Use_StrReverse |
|---|---|
| Author: | dr4k0nia, modified by Florian Roth |
| Description: | Detects mixed use of Microsoft.CSharp and VisualBasic to use StrReverse |
| Reference: | https://github.com/dr4k0nia/yara-rules |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | telegram_bot_api |
|---|---|
| Author: | rectifyq |
| Description: | Detects file containing Telegram Bot API |
| Rule name: | Windows_Generic_Threat_2bb6f41d |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Generic_Threat_62e1f5fc |
|---|---|
| Author: | Elastic Security |
| Rule name: | win_asyncrat_bytecodes |
|---|---|
| Author: | Matthew @ Embee_Research |
| Description: | Detects bytecodes present in unobfuscated AsyncRat Samples. Rule may also pick up on other Asyncrat-derived malware (Dcrat/venom etc) |
| Rule name: | win_asyncrat_unobfuscated |
|---|---|
| Author: | Matthew @ Embee_Research |
| Description: | Detects strings present in unobfuscated AsyncRat Samples. Rule may also pick up on other Asyncrat-derived malware (Dcrat/venom etc) |
| Rule name: | win_asyncrat_w0 |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect AsyncRat in memory |
| Reference: | internal research |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.