MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f98939d066a7065b750c6813a1ba0557acf80bbf36b54a48b2bd51df82f66a87. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 10


Intelligence 10 IOCs 1 YARA 11 File information Comments

SHA256 hash: f98939d066a7065b750c6813a1ba0557acf80bbf36b54a48b2bd51df82f66a87
SHA3-384 hash: 4f62d7492430648f12ce17f8c86cfdee10805ff3126b926cb844ed9bbb64235b9396ad4fd9901bce59b93b0567cc19b9
SHA1 hash: 3456cb4cb3b409e00d539e07d163376d9aaa33e3
MD5 hash: aa33aa4d05dd64a048d4112be0d61606
humanhash: angel-football-idaho-blue
File name:RS0494357706Y.vbs
Download: download sample
Signature AsyncRAT
File size:818 bytes
First seen:2022-06-22 11:45:35 UTC
Last seen:2022-07-30 20:24:45 UTC
File type:Visual Basic Script (vbs) vbs
MIME type:text/plain
ssdeep 12:s6Y3f8PLo7/m1Rz2wrWQPJGKagd3pme9is5RBgyb7OHYAqM9yr0+pNwSyFxtqyU:sz3GU/EfrDGt2weXBgeO4A7cDNw/zqyU
TLSH T13F012C88600BAAE34399B22F0DE17898B420734A9FB3E078607CA040C02B4B064CBEC3
Reporter stoerchl
Tags:AsyncRAT vbs

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
51.81.105.238:1981 https://threatfox.abuse.ch/ioc/719765/

Intelligence


File Origin
# of uploads :
2
# of downloads :
172
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
powershell
Result
Verdict:
MALICIOUS
Result
Threat name:
AsyncRAT
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Potential malicious VBS script found (suspicious strings)
Sigma detected: Powershell Download and Execute IEX
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses known network protocols on non-standard ports
VBScript performs obfuscated calls to suspicious functions
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected AsyncRAT
Yara detected Generic Downloader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 650346 Sample: RS0494357706Y.vbs Startdate: 22/06/2022 Architecture: WINDOWS Score: 100 79 israelpost.co.il 2->79 97 Snort IDS alert for network traffic 2->97 99 Multi AV Scanner detection for domain / URL 2->99 101 Malicious sample detected (through community Yara rule) 2->101 103 10 other signatures 2->103 13 wscript.exe 1 2->13         started        16 wscript.exe 2->16         started        signatures3 process4 signatures5 121 VBScript performs obfuscated calls to suspicious functions 13->121 123 Wscript starts Powershell (via cmd or directly) 13->123 18 powershell.exe 17 37 13->18         started        22 cmd.exe 16->22         started        process6 dnsIp7 81 51.81.94.115, 49733, 888 OVHFR United States 18->81 65 C:\ProgramData\x64\ISO\x64.ps1, ASCII 18->65 dropped 67 C:\ProgramData\x64\ISO\x64.bat, ASCII 18->67 dropped 25 wscript.exe 1 18->25         started        28 chrome.exe 15 308 18->28         started        32 conhost.exe 18->32         started        107 Wscript starts Powershell (via cmd or directly) 22->107 34 powershell.exe 22->34         started        36 conhost.exe 22->36         started        file8 signatures9 process10 dnsIp11 113 Wscript starts Powershell (via cmd or directly) 25->113 38 cmd.exe 1 25->38         started        91 192.168.2.1 unknown unknown 28->91 93 192.168.2.6 unknown unknown 28->93 95 239.255.255.250 unknown Reserved 28->95 69 C:\...\pnacl_public_x86_64_pnacl_sz_nexe, ELF 28->69 dropped 71 C:\...\pnacl_public_x86_64_pnacl_llc_nexe, ELF 28->71 dropped 73 C:\Users\user\...\pnacl_public_x86_64_ld_nexe, ELF 28->73 dropped 41 chrome.exe 29 28->41         started        115 Writes to foreign memory regions 34->115 117 Injects a PE file into a foreign processes 34->117 44 aspnet_compiler.exe 34->44         started        file12 signatures13 process14 dnsIp15 109 Wscript starts Powershell (via cmd or directly) 38->109 111 Bypasses PowerShell execution policy 38->111 46 powershell.exe 17 38->46         started        50 conhost.exe 38->50         started        85 mypost.israelpost.co.il 41->85 87 985d642499dc49b5accfcc4f27d0cb62.v1.radwarecloud.net 141.226.102.174, 443, 49742, 49748 RADWAREIL Israel 41->87 89 23 other IPs or domains 41->89 signatures16 process17 file18 75 C:\ProgramData\x64\ISO\xxx.ps1, ASCII 46->75 dropped 77 C:\ProgramData\x64\ISO\xx.bat, ASCII 46->77 dropped 125 Writes to foreign memory regions 46->125 127 Injects a PE file into a foreign processes 46->127 52 wscript.exe 46->52         started        55 aspnet_compiler.exe 46->55         started        signatures19 process20 dnsIp21 105 Wscript starts Powershell (via cmd or directly) 52->105 58 cmd.exe 52->58         started        83 superfaster1.is-found.org 51.81.105.238, 1981, 49911 OVHFR United States 55->83 signatures22 process23 signatures24 119 Wscript starts Powershell (via cmd or directly) 58->119 61 conhost.exe 58->61         started        63 powershell.exe 58->63         started        process25
Threat name:
Script.Trojan.Valyria
Status:
Malicious
First seen:
2022-06-09 23:27:55 UTC
File Type:
Text (PowerShell)
AV detection:
11 of 26 (42.31%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
asyncrat
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat botnet:default persistence rat suricata
Behaviour
Enumerates system info in registry
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Blocklisted process makes network request
Async RAT payload
AsyncRat
suricata: ET MALWARE Generic AsyncRAT Style SSL Cert
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
Malware Config
C2 Extraction:
superfaster1.is-found.org:1981
superfaster22.selfip.info:1981
superslow.is-a-nascarfan.com:1981
superhay.is-a-geek.com:1981
superziad.is-a-liberal.com:1981
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AsyncRat
Author:kevoreilly, JPCERT/CC Incident Response Group
Description:AsyncRat Payload
Rule name:INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse
Author:ditekSHen
Description:Detects file containing reversed ASEP Autorun registry keys
Rule name:malware_asyncrat
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research
Rule name:MAL_AsnycRAT
Author:SECUINFRA Falcon Team
Description:Detects AsnycRAT based on it's config decryption routine
Rule name:MAL_AsyncRAT_Config_Decryption
Author:SECUINFRA Falcon Team
Description:Detects AsnycRAT based on it's config decryption routine
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_DOTNET_PE_List_AV
Author:SECUINFRA Falcon Team
Description:Detecs .NET Binary that lists installed AVs
Rule name:SUSP_Reverse_Run_Key
Author:SECUINFRA Falcon Team
Description:Detects a Reversed Run Key
Rule name:win_asyncrat_j1
Author:Johannes Bader @viql
Description:detects AsyncRAT
Rule name:win_asyncrat_w0
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments