MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e3733d68078f927a67479fded197bf45287c17a775da4c81d3b3d4853e57d1f4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 19


Intelligence 19 IOCs 1 YARA 3 File information Comments

SHA256 hash: e3733d68078f927a67479fded197bf45287c17a775da4c81d3b3d4853e57d1f4
SHA3-384 hash: c286dd252ec238a211a6f9d526321969a50221f9b3e4f97c3b9d12bfcc38a182eb63fd9da578746f213751e218dd74b4
SHA1 hash: d7202ed12e96ae72b06507c31bcaa1c341d2e381
MD5 hash: 805ef0d13b176f08ad181cea3bb2ace0
humanhash: orange-texas-massachusetts-louisiana
File name:TT payment slip.exe
Download: download sample
Signature AsyncRAT
File size:519'168 bytes
First seen:2025-12-04 06:55:12 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'599 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 12288:T6FKfeh2hb94dzCFycWJiWl3yZrY+pKpc/g+DIR:uIBmGFyFLlCBYNbR
Threatray 49 similar samples on MalwareBazaar
TLSH T12FB4122616C5DA16DAE513B11A32E37642BC6F5DA821C30ADEEFEDFF302A750A404753
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter abuse_ch
Tags:AsyncRAT exe RAT


Avatar
abuse_ch
AsyncRAT C2:
172.245.93.109:9990

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
172.245.93.109:9990 https://threatfox.abuse.ch/ioc/1667492/

Intelligence


File Origin
# of uploads :
1
# of downloads :
109
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
asyncrat
ID:
1
File name:
_e3733d68078f927a67479fded197bf45287c17a775da4c81d3b3d4853e57d1f4.exe
Verdict:
Malicious activity
Analysis date:
2025-12-04 07:11:07 UTC
Tags:
auto-sch-xml asyncrat netreactor

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.9%
Tags:
asyncrat stration shell spawn
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
masquerade packed vbnet
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-12-04T04:09:00Z UTC
Last seen:
2025-12-06T02:00:00Z UTC
Hits:
~100
Detections:
PDM:Trojan.Win32.Generic HEUR:Backdoor.MSIL.XWorm.gen Trojan.MSIL.Inject.sb Backdoor.MSIL.Crysan.b Trojan.MSIL.Taskun.sb Trojan.MSIL.Crypt.sb HEUR:Trojan.MSIL.Taskun.sb Backdoor.MSIL.Crysan.sb Backdoor.MSIL.Crysan.fb Backdoor.MSIL.Crysan.d Backdoor.MSIL.Crysan.c
Result
Threat name:
AsyncRAT, PureLog Stealer
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Found malware configuration
Initial sample is a PE file and has a suspicious name
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected AsyncRAT
Yara detected PureLog Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1826176 Sample: TT payment slip.exe Startdate: 04/12/2025 Architecture: WINDOWS Score: 100 44 shed.dual-low.part-0041.t-0009.t-msedge.net 2->44 46 shed.dual-low.part-0012.t-0009.t-msedge.net 2->46 48 4 other IPs or domains 2->48 52 Suricata IDS alerts for network traffic 2->52 54 Found malware configuration 2->54 56 Sigma detected: Scheduled temp file as task from temp location 2->56 58 12 other signatures 2->58 8 TT payment slip.exe 7 2->8         started        12 eupEpp.exe 5 2->12         started        signatures3 process4 file5 38 C:\Users\user\AppData\Roaming\eupEpp.exe, PE32 8->38 dropped 40 C:\Users\user\AppData\Local\...\tmpEAB8.tmp, XML 8->40 dropped 42 C:\Users\user\...\TT payment slip.exe.log, ASCII 8->42 dropped 60 Adds a directory exclusion to Windows Defender 8->60 14 powershell.exe 23 8->14         started        17 powershell.exe 23 8->17         started        19 MSBuild.exe 2 8->19         started        22 schtasks.exe 1 8->22         started        62 Multi AV Scanner detection for dropped file 12->62 24 schtasks.exe 12->24         started        26 MSBuild.exe 12->26         started        signatures6 process7 dnsIp8 64 Loading BitLocker PowerShell Module 14->64 28 conhost.exe 14->28         started        30 WmiPrvSE.exe 14->30         started        32 conhost.exe 17->32         started        50 172.245.93.109, 49717, 9990 AS-COLOCROSSINGUS United States 19->50 34 conhost.exe 22->34         started        36 conhost.exe 24->36         started        signatures9 process10
Verdict:
inconclusive
YARA:
10 match(es)
Tags:
.Net Executable Managed .NET PDB Path PE (Portable Executable) PE File Layout SOS: 0.52 Win 32 Exe x86
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat botnet:dec bots discovery execution persistence rat
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
SmartAssembly .NET packer
Suspicious use of SetThreadContext
Checks computer location settings
Executes dropped EXE
Command and Scripting Interpreter: PowerShell
AsyncRat
Asyncrat family
Malware Config
C2 Extraction:
172.245.93.109:9990
Unpacked files
SH256 hash:
e3733d68078f927a67479fded197bf45287c17a775da4c81d3b3d4853e57d1f4
MD5 hash:
805ef0d13b176f08ad181cea3bb2ace0
SHA1 hash:
d7202ed12e96ae72b06507c31bcaa1c341d2e381
SH256 hash:
820fff868397de25929bf0bbbf6b09645ac4f768f40975de5136a9cff03146e9
MD5 hash:
31290b157627016edf3a4668427de613
SHA1 hash:
2f399703cad1e10636a2bf962322f6764487e5f1
Detections:
win_asyncrat_w0 SUSP_OBF_NET_Reactor_Indicators_Jan24 asyncrat win_asyncrat_bytecodes
SH256 hash:
defcd85e10da488092d226c075cfe700cc982580dcfe2a128bb61baf667c99ad
MD5 hash:
eb0c8b0b7d00fd05959cba51ffcd1ea9
SHA1 hash:
78d2cbb4354f8a0ecc2b0fda5ee8e6914fbbbc77
Detections:
win_asyncrat_w0 SUSP_OBF_NET_Reactor_Indicators_Jan24 asyncrat
SH256 hash:
03b25e10b537e1a71f03a80070bf0554b5a5b187c77b70625f6eeb0fd909165e
MD5 hash:
41a373685140e1916031f04e1dcd63a6
SHA1 hash:
2174ba74d331caa8d1e66455aefa6ba92a63c07e
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
525bb9ebdc8a3ec5ca82a6e1d5878ffd977931f7f944ac5aca9d533f79a4aea8
MD5 hash:
ed6b6d54079d5a27906bb623244d857b
SHA1 hash:
e7c23969271acdd7ef88f18aae514bd8017400f6
Detections:
win_asyncrat_w0 SUSP_OBF_NET_Reactor_Indicators_Jan24 asyncrat win_asyncrat_bytecodes
Malware family:
VIPKeylogger
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments