MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f9a566c94783c5d9f75b0f98c1310e05e5968b35b5229b07b7a54ea072890399. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 5


Intelligence 5 IOCs YARA 1 File information Comments

SHA256 hash: f9a566c94783c5d9f75b0f98c1310e05e5968b35b5229b07b7a54ea072890399
SHA3-384 hash: f340b36ed211018a7e00a97052bbaaa7794d5779c00274b89da0e55770236610800fd71c7088fcf6b5963f796ccd8494
SHA1 hash: 200febbe1c918c982e0c37ec045b79d56dcc4256
MD5 hash: 93550d0ac9c874ff0fe3e3904d9287ac
humanhash: comet-saturn-single-nitrogen
File name:90W.ps1
Download: download sample
Signature AsyncRAT
File size:5'840'889 bytes
First seen:2022-02-22 19:11:53 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 24576:MPryW3GF/TM9IG9L9ZlR7FJfSvrl+sUic7Za0aFg4bkcOFIk86q5hpmqP147IR/l:h
Threatray 1'247 similar samples on MalwareBazaar
TLSH T110461961FC30B6A2ED85D28E645552DFF92903A3B350043532EEF619851ACBAF78FB44
Reporter adm1n_usa32
Tags:AsyncRAT powershell ps1

Intelligence


File Origin
# of uploads :
1
# of downloads :
352
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2022-02-22 19:12:14 UTC
File Type:
Text (PowerShell)
AV detection:
9 of 27 (33.33%)
Threat level:
  5/5
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat botnet:default rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops file in System32 directory
Suspicious use of SetThreadContext
Async RAT payload
AsyncRat
Process spawned unexpected child process
Malware Config
C2 Extraction:
asyncmoney.duckdns.org:7829
asyncmoney.duckdns.org:7840
asyncmoney.duckdns.org:7841
asyncmoney.duckdns.org:7842
asyncmoney.duckdns.org:7849
asyncpcc.duckdns.org:7829
asyncpcc.duckdns.org:7840
asyncpcc.duckdns.org:7841
asyncpcc.duckdns.org:7842
asyncpcc.duckdns.org:7849
monedfghsja.duckdns.org:7829
monedfghsja.duckdns.org:7840
monedfghsja.duckdns.org:7841
monedfghsja.duckdns.org:7842
monedfghsja.duckdns.org:7849
Malware family:
AsyncRAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AsyncRAT

PowerShell (PS) ps1 f9a566c94783c5d9f75b0f98c1310e05e5968b35b5229b07b7a54ea072890399

(this sample)

  
Delivery method
Distributed via web download

Comments