MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 eae00f35df37b967e5876281d5ef6dd2c46516c59381d93078ab16278c5e1712. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 17


Intelligence 17 IOCs YARA 7 File information Comments

SHA256 hash: eae00f35df37b967e5876281d5ef6dd2c46516c59381d93078ab16278c5e1712
SHA3-384 hash: 0160f4a5f812bed16039a3693689ceb65348f77c8034595824a4b0d1dd2ead03da028d44e124614c10dd7caa82d91cb1
SHA1 hash: faa344155fed1581f9281487168fd7407ef24c83
MD5 hash: 72d504e45323c1441110ba842ed06f95
humanhash: apart-alpha-michigan-double
File name:WpsSetup.exe
Download: download sample
Signature AsyncRAT
File size:4'538'515 bytes
First seen:2025-09-19 10:46:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c38362e0e37590c08f252fc98b1f0136 (11 x ValleyRAT, 1 x Blackmoon, 1 x AsyncRAT)
ssdeep 98304:RUZXSBbedKA9koXQGktxoq1I2DH2947K/Hk3nbmb9n1:Rs9NXQGaxoq1I2b24zi3
TLSH T1072633CB7180AA8ACE7416B3115B89E48B37FEFE96720146E1D532981CFB9B71437136
TrID 63.4% (.EXE) UPX compressed Win32 Executable (27066/9/6)
11.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.5% (.EXE) Win32 Executable (generic) (4504/4/1)
4.7% (.EXE) OS/2 Executable (generic) (2029/13)
4.6% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter ertutioabcd
Tags:agent AsyncRAT exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
131
Origin country :
HK HK
Vendor Threat Intelligence
Malware family:
asyncrat
ID:
1
File name:
WpsSetup.exe
Verdict:
Malicious activity
Analysis date:
2025-09-19 10:53:21 UTC
Tags:
upx netreactor auto-sch rat asyncrat remote

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.9%
Tags:
autorun spawn virus sage
Result
Verdict:
Malware
Maliciousness:
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context anti-debug crypto fingerprint keylogger microsoft_visual_cc overlay overlay packed packed packed packed upx
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-09-19T07:49:00Z UTC
Last seen:
2025-09-19T07:49:00Z UTC
Hits:
~10
Detections:
Trojan-Dropper.Win32.Agent.sb Trojan.Win32.Shellcode.sb Backdoor.MSIL.Crysan.sb Trojan.Win32.Agent.sb Backdoor.MSIL.Crysan.d HEUR:Backdoor.MSIL.Crysan.gen Trojan.MSIL.Donut.sb Trojan.Agentb.TCP.C&C Backdoor.MSIL.Agent.sb Backdoor.DCRat.TCP.C&C
Malware family:
CryptoNick Soft™
Verdict:
Suspicious
Verdict:
Malware
YARA:
5 match(es)
Tags:
.Net .Net Obfuscator .Net Reactor Executable Managed .NET PE (Portable Executable) PE File Layout SFX 7z SOS: 0.88 Win 32 Exe x86
Threat name:
Win32.Malware.Heuristic
Status:
Malicious
First seen:
2025-09-19 10:47:34 UTC
File Type:
PE (Exe)
Extracted files:
33
AV detection:
19 of 24 (79.17%)
Threat level:
  2/5
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat adware defense_evasion discovery execution persistence rat spyware upx
Behaviour
Kills process with taskkill
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
UPX packed file
Checks computer location settings
Executes dropped EXE
Creates new service(s)
Downloads MZ/PE file
Async RAT payload
AsyncRat
Asyncrat family
Verdict:
Malicious
Tags:
Win.Malware.Bulz-10016535-0 TA_Abused_Service
YARA:
n/a
Unpacked files
SH256 hash:
eae00f35df37b967e5876281d5ef6dd2c46516c59381d93078ab16278c5e1712
MD5 hash:
72d504e45323c1441110ba842ed06f95
SHA1 hash:
faa344155fed1581f9281487168fd7407ef24c83
SH256 hash:
24cba021e9524ca9c8276dec97046ac0440ac5c85a966c174aa9a9827862e45f
MD5 hash:
e662f76eaaffd1119d238dfcffaf11d7
SHA1 hash:
e9146d2be4a7c45e43c6cb66fef876e15a95fea6
SH256 hash:
c6ac7d9add40b913112b265d4f366d9ef80bbd711049db085fc750fcad4e14d8
MD5 hash:
b52ba2b99108c496389ae5bb81fa6537
SHA1 hash:
9073d8c4a1968be24357862015519f2afecd833a
SH256 hash:
37649b899073d9a55225aca8ba8b48fb1eacc732a7187215d4ba8012f53bc48d
MD5 hash:
10a308c543baff12708b01b4cde9b236
SHA1 hash:
7a74b4fb7e405d59c29b47d248e9c646526a3aac
SH256 hash:
9bb2a5770f9d4b49ee5f42a43f83012d3ed4c2fb8471e7d1479bea598c58776e
MD5 hash:
8b762f5dca4074a4187ea10ba0d1705a
SHA1 hash:
0befde7e83a3211222908e1b521302ce93eb3631
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
2b9e50fadedbd01afe3a5b354376742515beafa23e3ed1488b42721a548bae90
MD5 hash:
31b7f58ef00d1bab980efabadd701b1b
SHA1 hash:
916a1d536ab1842add739241f431bc9672a4c719
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:NET
Author:malware-lu
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:UPXv20MarkusLaszloReiser
Author:malware-lu
Rule name:upx_largefile
Author:k3nr9

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AsyncRAT

Executable exe eae00f35df37b967e5876281d5ef6dd2c46516c59381d93078ab16278c5e1712

(this sample)

  
Delivery method
Distributed via web download

Comments