MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e645f8ae3d43995692c197630e2b9c241d2b9d8dc6d1709a30a7a31c7257a84d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 18


Intelligence 18 IOCs YARA 3 File information Comments

SHA256 hash: e645f8ae3d43995692c197630e2b9c241d2b9d8dc6d1709a30a7a31c7257a84d
SHA3-384 hash: 9d7e4df2ab49685a8499d9d7a74512ca85fa66a380027658b23e4409827f34f39cff5f44b3f62df2701742a9078c7ec1
SHA1 hash: 933fc276335dfa3c635bcf4bd45aff0a2f2c6eb2
MD5 hash: ff1f2d86af02f9ae97bdd04e818721fe
humanhash: fillet-edward-tennessee-uranus
File name:e645f8ae3d43995692c197630e2b9c241d2b9d8dc6d1709a30a7a31c7257a84d
Download: download sample
Signature AsyncRAT
File size:519'168 bytes
First seen:2025-12-08 14:41:56 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'750 x AgentTesla, 19'656 x Formbook, 12'248 x SnakeKeylogger)
ssdeep 12288:Zj5KfHvnx/ux/GV7vdVotdMx/Qe6nsWLCdr4qwEZ8VgMjgwFBDFAjBLKex/:ZQxWxeVzdyMxZhfrEVRBO99x
TLSH T107B4E09476A89823C9B953F90E71F2311BF62D9EB510E2CA8DD56DDF38DAF004D04A63
TrID 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.0% (.EXE) Win64 Executable (generic) (10522/11/4)
6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.2% (.EXE) Win32 Executable (generic) (4504/4/1)
1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Magika pebin
Reporter adrian__luca
Tags:AsyncRAT exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
86
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
e645f8ae3d43995692c197630e2b9c241d2b9d8dc6d1709a30a7a31c7257a84d
Verdict:
Malicious activity
Analysis date:
2025-12-08 16:32:34 UTC
Tags:
xworm

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
keylog shell virus
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
packed
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-11-11T07:53:00Z UTC
Last seen:
2025-12-10T03:37:00Z UTC
Hits:
~100
Verdict:
inconclusive
YARA:
10 match(es)
Tags:
.Net Executable Managed .NET PDB Path PE (Portable Executable) PE File Layout SOS: 0.33 Win 32 Exe x86
Threat name:
ByteCode-MSIL.Trojan.XenoRAT
Status:
Malicious
First seen:
2025-11-11 15:52:10 UTC
File Type:
PE (.Net Exe)
Extracted files:
17
AV detection:
25 of 36 (69.44%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
xworm unc_loader_037
Similar samples:
Result
Malware family:
Score:
  10/10
Tags:
family:xworm discovery execution rat trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Command and Scripting Interpreter: PowerShell
Detect Xworm Payload
Xworm
Xworm family
Malware Config
C2 Extraction:
107.175.246.23:6000
Unpacked files
SH256 hash:
a4e44ba6aea821d69519bd4ae2236c25ea6d7bfd7d7fac4056f995ff0a39dad0
MD5 hash:
f62accbf203ef804c829174d11821d2e
SHA1 hash:
59465ee62f7e8e2062ab054d3fe2f5f18467c9bf
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
4d53d00fd375cd12bd2a2ba8d8b0892b1886419b04557a6895202a35e9dd24d1
MD5 hash:
1db387e4922f2dfa8f868bae763a8f06
SHA1 hash:
6e59dbe663ca23603ddf9068cbaf1bff52b33a62
Detections:
win_xworm_a0 win_xworm_w0 XWorm win_xworm_bytestring win_mal_XWorm INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA MALWARE_Win_AsyncRAT MALWARE_Win_XWorm
SH256 hash:
2f9fa4407ae9b2d52efda13e93f836fd3585b7bbcbf09830433cdfc1f2371621
MD5 hash:
549cbcd98723b8780c550fe75767d85a
SHA1 hash:
8579083db93ce9b208b32625f46f52c1530e4eda
SH256 hash:
e645f8ae3d43995692c197630e2b9c241d2b9d8dc6d1709a30a7a31c7257a84d
MD5 hash:
ff1f2d86af02f9ae97bdd04e818721fe
SHA1 hash:
933fc276335dfa3c635bcf4bd45aff0a2f2c6eb2
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments