MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ec173f6992ea6a8731f820a213610af9995283cfcd1860483855f5d69a1c7629. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 19


Intelligence 19 IOCs YARA 1 File information Comments

SHA256 hash: ec173f6992ea6a8731f820a213610af9995283cfcd1860483855f5d69a1c7629
SHA3-384 hash: 7b1f260c60f3b9fe39305c6a63e370942fd5c6a07db15cdee48a6ef4b2231e5340aa8321c49356f0b9b0890b2a2d3087
SHA1 hash: 888a215745b9201e51483c43a57a3285f701528b
MD5 hash: a04de842998d280a18024061dbf07153
humanhash: east-skylark-lion-nebraska
File name:ec173f6992ea6a8731f820a213610af9995283cfcd1860483855f5d69a1c7629
Download: download sample
Signature AsyncRAT
File size:2'837'504 bytes
First seen:2026-01-26 18:41:56 UTC
Last seen:2026-01-27 08:35:35 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash a9c887a4f18a3fede2cc29ceea138ed3 (35 x CoinMiner, 18 x AsyncRAT, 17 x BlankGrabber)
ssdeep 49152:u470nRTwkgxdEm+/wR4E3Q+hR8YYvDiL+mQcqNtyuVgSV9p1kyeoe5ySvVU8X/gY:u470VwpGwR4ELR8YSmL+mQJXyoXVjeRj
Threatray 23 similar samples on MalwareBazaar
TLSH T155D5D058558CBDE7F17812B051FB266B9D8DFD2B1A009C8620A31E4B74FE027FE21D69
TrID 38.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
15.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
11.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.5% (.EXE) Win32 Executable (generic) (4504/4/1)
4.8% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Magika pebin
Reporter Neiki
Tags:AsyncRAT binder exe RAT StormKitty unambindernative

Intelligence


File Origin
# of uploads :
2
# of downloads :
180
Origin country :
DE DE
Vendor Threat Intelligence
Malware configuration found for:
UnamBinder WorldWind
Details
UnamBinder
XOR decrypted component(s)
WorldWind
api configuration including a version, ownerid, and secret, and c2 socket addresses, a license key, a version, a mutex, AES-CBC decryption parameters, an SSL certificate and server signature, an interval, varying flags, and possibly a filepath and a group
Malware family:
asyncrat
ID:
1
File name:
ExtremeInjectorv3.7.3.exe
Verdict:
Malicious activity
Analysis date:
2026-01-26 18:32:08 UTC
Tags:
github pastebin stealer stormkitty auto-reg telegram worldwind asyncrat rat xor-url generic ims-api api-base64 crypto-regex

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
infosteal asyncrat autorun emotet
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-01-26T15:36:00Z UTC
Last seen:
2026-01-27T00:27:00Z UTC
Hits:
~100
Detections:
HEUR:Trojan-Banker.Win32.ClipBanker.gen PDM:Trojan.Win32.Generic BSS:Worm.Win32.BSS.ScreenLock BSS:Trojan.Win32.Generic.nblk Backdoor.Telebot.HTTP.C&C Backdoor.MSIL.Crysan.sb BSS:Trojan.Win32.Generic Trojan-Spy.TeleBot.HTTP.C&C HEUR:Trojan-PSW.MSIL.Stealer.gen HEUR:Trojan.Win64.Generic HEUR:Trojan.Win32.Generic HEUR:Backdoor.MSIL.SheetRat.gen BSS:Trojan.Win32.ImSKP.am Trojan-PSW.MSIL.Stealer.a Trojan-Banker.Win32.Express.sb HEUR:Trojan.MSIL.Shelpak.gen BSS:Exploit.Win32.Generic.nblk Trojan.Win32.Vimditator.sb Trojan-PSW.Win32.Coins.sb HEUR:Backdoor.MSIL.Crysan.gen Trojan-Banker.Win32.ClipBanker.sb HEUR:Trojan-Dropper.Win32.Agent.gen Trojan.Win32.Agent.sb Trojan-PSW.MSIL.WorldWind.sb Trojan-Downloader.MSIL.Enigma.sb not-a-virus:VHO:RiskTool.MSIL.Convagent.gen not-a-virus:VHO:RiskTool.MSIL.Injecter.gen not-a-virus:RiskTool.MSIL.Injector.v not-a-virus:VHO:RiskTool.MSIL.Generic
Malware family:
Extreme Injector
Verdict:
Malicious
Gathering data
Threat name:
Win32.Dropper.Dapato
Status:
Malicious
First seen:
2026-01-26 18:32:13 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
29 of 38 (76.32%)
Threat level:
  3/5
Result
Malware family:
stormkitty
Score:
  10/10
Tags:
family:asyncrat family:stormkitty botnet:default defense_evasion discovery execution persistence privilege_escalation rat spyware stealer
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Browser Information Discovery
Enumerates physical storage devices
Event Triggered Execution: Netsh Helper DLL
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Wi-Fi Discovery
Hide Artifacts: Ignore Process Interrupts
Adds Run key to start application
Contacts third-party web service commonly abused for C2
Drops desktop.ini file(s)
Looks up external IP address via web service
Looks up geolocation information via web service
Obfuscated Files or Information: Command Obfuscation
Checks computer location settings
Executes dropped EXE
Prevents Microsoft Defender from scanning certain paths by adding an exclusion.
Reads user/profile data of web browsers
Command and Scripting Interpreter: PowerShell
Async RAT payload
AsyncRat
Asyncrat family
StormKitty
StormKitty payload
Stormkitty family
Malware Config
C2 Extraction:
https://api.telegram.org/bot8498071055:AAHpkLnFSqcqoBJ5BRLXLoNzGKZN-fcRM_E/sendMessage?chat_id=5801620744
Unpacked files
SH256 hash:
ec173f6992ea6a8731f820a213610af9995283cfcd1860483855f5d69a1c7629
MD5 hash:
a04de842998d280a18024061dbf07153
SHA1 hash:
888a215745b9201e51483c43a57a3285f701528b
SH256 hash:
2956c92fe0596ceb5b3eb5576b16a6eac61494ddb5c2a41d544fee0abea9cfb0
MD5 hash:
e6f8d39dd63c77e30fe2124543542bcc
SHA1 hash:
342c86cf1a25134d402777a4add414d3c60c8469
SH256 hash:
2847c490f325228a61de5f08b27b505a82eae5307c3c2713123a03f5fa3415b9
MD5 hash:
32a7cf2f2ab148fcc8ed618033f38b3a
SHA1 hash:
1f50a6d49b9b6671834babc87b353e3486aae8fb
Detections:
win_asyncrat_w0 WorldWindStealer cn_utf8_windows_terminal SUSP_NET_Msil_Suspicious_Use_StrReverse asyncrat win_asyncrat_bytecodes win_asyncrat_unobfuscated INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse INDICATOR_SUSPICIOUS_EXE_RawPaste_URL INDICATOR_SUSPICIOUS_EXE_TelegramChatBot INDICATOR_SUSPICIOUS_EXE_CC_Regex INDICATOR_SUSPICIOUS_EXE_Discord_Regex INDICATOR_SUSPICIOUS_EXE_References_VPN INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID INDICATOR_SUSPICIOUS_EXE_WirelessNetReccon MALWARE_Win_StormKitty MALWARE_Win_Multi_Family_InfoStealer MALWARE_Win_WorldWind
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments