MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f37f1b8929f08846a1f80ad0201a2ded2e90f831a169f8001363459570616644. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 18


Intelligence 18 IOCs YARA 7 File information Comments

SHA256 hash: f37f1b8929f08846a1f80ad0201a2ded2e90f831a169f8001363459570616644
SHA3-384 hash: 6e0e023d79cbb049c257ac9653cb8e5f8fd8bb7391afbdf03e6a793153f05bb2e6d01a4313bb2d8da75dad7d8436b721
SHA1 hash: 9596763b4df5f046f7543a79de1bef7e0fc7a641
MD5 hash: 60731448dcbb8001a51d22754ea05dfb
humanhash: arkansas-lima-five-moon
File name:SecuriteInfo.com.Win32.TrojanX-gen.4878.29665
Download: download sample
Signature AsyncRAT
File size:450'048 bytes
First seen:2024-09-18 02:20:06 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'607 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 12288:6QM1R3TuI600Ta0qHnmDPFYKRZqFLtomh:X0R3yq8qFLtoo
Threatray 404 similar samples on MalwareBazaar
TLSH T151A41A8A3241A19EEF5780B8A1D5BC65B1067D5F072F4023E267958FD60F6CACFAF052
TrID 28.5% (.EXE) Win64 Executable (generic) (10523/12/4)
17.8% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
13.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
12.2% (.EXE) Win32 Executable (generic) (4504/4/1)
5.6% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Magika pebin
File icon (PE):PE icon
dhash icon 64ccd4f0f0f0f0d4 (3 x AsyncRAT, 2 x AveMariaRAT, 1 x QuasarRAT)
Reporter SecuriteInfoCom
Tags:AsyncRAT exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
549
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
asyncrat
ID:
1
File name:
SecuriteInfo.com.Win32.TrojanX-gen.4878.29665
Verdict:
Malicious activity
Analysis date:
2024-09-18 02:23:22 UTC
Tags:
asyncrat

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.9%
Tags:
Execution Network Stealth Trojan
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
confuser confuserex net packed packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AsyncRAT
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Detected unpacking (changes PE section rights)
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AsyncRAT
Yara detected Generic Downloader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1512929 Sample: SecuriteInfo.com.Win32.Troj... Startdate: 18/09/2024 Architecture: WINDOWS Score: 100 55 Found malware configuration 2->55 57 Malicious sample detected (through community Yara rule) 2->57 59 Multi AV Scanner detection for submitted file 2->59 61 8 other signatures 2->61 10 SecuriteInfo.com.Win32.TrojanX-gen.4878.29665.exe 1 2->10         started        14 vscr.exe 1 2->14         started        process3 file4 51 SecuriteInfo.com.W....4878.29665.exe.log, ASCII 10->51 dropped 65 Detected unpacking (changes PE section rights) 10->65 67 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 10->67 69 Injects a PE file into a foreign processes 10->69 71 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 10->71 16 SecuriteInfo.com.Win32.TrojanX-gen.4878.29665.exe 6 10->16         started        19 SecuriteInfo.com.Win32.TrojanX-gen.4878.29665.exe 10->19         started        73 Multi AV Scanner detection for dropped file 14->73 75 Machine Learning detection for dropped file 14->75 21 vscr.exe 2 14->21         started        24 vscr.exe 2 14->24         started        signatures5 process6 dnsIp7 49 C:\Users\user\AppData\Roaming\vscr.exe, PE32 16->49 dropped 26 cmd.exe 1 16->26         started        29 cmd.exe 1 16->29         started        31 WerFault.exe 2 19->31         started        53 154.216.17.155, 49711, 49712, 49713 SKHT-ASShenzhenKatherineHengTechnologyInformationCo Seychelles 21->53 file8 process9 signatures10 63 Uses schtasks.exe or at.exe to add and modify task schedules 26->63 33 conhost.exe 26->33         started        35 schtasks.exe 1 26->35         started        37 vscr.exe 29->37         started        39 conhost.exe 29->39         started        41 timeout.exe 1 29->41         started        process11 process12 43 vscr.exe 37->43         started        45 vscr.exe 37->45         started        process13 47 WerFault.exe 43->47         started       
Threat name:
Win32.Trojan.Strictor
Status:
Malicious
First seen:
2024-09-18 03:01:29 UTC
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat botnet:default discovery rat
Behaviour
Delays execution with timeout.exe
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Checks computer location settings
Executes dropped EXE
AsyncRat
Malware Config
C2 Extraction:
154.216.17.155:8808
154.216.17.155:7707
Unpacked files
SH256 hash:
31a490d665e57f92a0d7f504d75e3e8e2bb34147d270b84803090be4752de19c
MD5 hash:
84e3b399a5b7267bad68105acbbd5b76
SHA1 hash:
f980ff9887074b0b72f2128dfbfa8c0a8c2549de
Detections:
SUSP_NET_NAME_ConfuserEx
SH256 hash:
7236c4e292be0a5ccc409347bbbd37bda640b3b6295148f396acfb67c200a86b
MD5 hash:
4d0761ab9af0758f17b9389095131e8f
SHA1 hash:
95ba25c3ed9aec7b8a3f040c514bc4420646e2b7
Detections:
AsyncRAT win_asyncrat_w0 asyncrat
SH256 hash:
d29c2c259b3e4b21d16f1df61f5fd1d1f61418d2e438ee110b13c8f893c9eacc
MD5 hash:
a0e40bab2123b51ee5f679c85338d525
SHA1 hash:
76fad40aa27d2fac579cd88e6e413f73cd19ecb5
SH256 hash:
f37f1b8929f08846a1f80ad0201a2ded2e90f831a169f8001363459570616644
MD5 hash:
60731448dcbb8001a51d22754ea05dfb
SHA1 hash:
9596763b4df5f046f7543a79de1bef7e0fc7a641
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_NET_NAME_ConfuserEx
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Detect_APT29_WINELOADER_Backdoor
Author:daniyyell
Description:Detects APT29's WINELOADER backdoor variant used in phishing campaigns, this rule also detect bad pdf,shtml,htm and vbs or maybe more depends
Reference:https://cloud.google.com/blog/topics/threat-intelligence/apt29-wineloader-german-political-parties
Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:INDICATOR_EXE_Packed_ConfuserEx_Custom
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Custom; outside of GIT
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high

Comments