MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fd927c3c6a733cab18a4f657a605682c6d043728442d0d2fe4dd1d464fb0d7ec. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Arechclient2


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: fd927c3c6a733cab18a4f657a605682c6d043728442d0d2fe4dd1d464fb0d7ec
SHA3-384 hash: 54db0b7f019f072e3c36ae6344213f1c3b8ce737927032745d5db01586641f1224bcf0b6d202ca7479f48c1e3ee8b04d
SHA1 hash: 3e2cd6875db025c07280166bdf038c872d9c9d03
MD5 hash: 0947fab2dc35b66694760c51d7073ed5
humanhash: october-wyoming-eleven-oranges
File name:0947fab2dc35b66694760c51d7073ed5.exe
Download: download sample
Signature Arechclient2
File size:5'646'416 bytes
First seen:2023-12-18 17:45:16 UTC
Last seen:2023-12-18 19:19:50 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'648 x AgentTesla, 19'452 x Formbook, 12'201 x SnakeKeylogger)
ssdeep 98304:ZjwIyFNlPJuU+YTrn2RILFifv6T4WLeUcP48MppHlAnB:dyFN7uU+YfzJifm4xUoMjlmB
Threatray 269 similar samples on MalwareBazaar
TLSH T1D9468D027F50AB16F44D5137E9DE480903F4E8693692F7AB29B8323D58413637C9ADEE
TrID 49.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
20.9% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
8.7% (.SCR) Windows screen saver (13097/50/3)
7.0% (.EXE) Win64 Executable (generic) (10523/12/4)
4.4% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon b4a4a49c9ca4e4e4 (1 x Arechclient2)
Reporter abuse_ch
Tags:Arechclient2 exe


Avatar
abuse_ch
Arechclient2 C2:
45.141.87.63:15648

Intelligence


File Origin
# of uploads :
2
# of downloads :
330
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Creating a file in the %temp% directory
Launching a process
Creating a file in the %AppData% subdirectories
Creating a file
DNS request
Sending a custom TCP request
Forced shutdown of a system process
Unauthorized injection to a system process
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
cmd control expand lolbin net_reactor obfuscated overlay packed packed regasm replace
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine, SectopRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Connects to a pastebin service (likely for C&C)
Connects to many ports of the same IP (likely port scanning)
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected RedLine Stealer
Yara detected SectopRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1364085 Sample: 02g7xDeBN5.exe Startdate: 18/12/2023 Architecture: WINDOWS Score: 100 25 pastebin.com 2->25 33 Snort IDS alert for network traffic 2->33 35 Malicious sample detected (through community Yara rule) 2->35 37 Yara detected RedLine Stealer 2->37 41 3 other signatures 2->41 7 02g7xDeBN5.exe 9 2->7         started        11 Store_data_accounting_software.exe 3 2->11         started        signatures3 39 Connects to a pastebin service (likely for C&C) 25->39 process4 file5 21 C:\...\Store_data_accounting_software.exe, PE32 7->21 dropped 23 C:\Users\user\AppData\...\Protect544cd51a.dll, PE32 7->23 dropped 43 Writes to foreign memory regions 7->43 45 Allocates memory in foreign processes 7->45 47 Injects a PE file into a foreign processes 7->47 13 RegAsm.exe 15 12 7->13         started        17 RegAsm.exe 6 11->17         started        19 RegAsm.exe 11->19         started        signatures6 process7 dnsIp8 27 94.130.51.115, 15648 HETZNER-ASDE Germany 13->27 29 45.141.87.63, 15648, 49709, 49711 CLOUDBACKBONERU Russian Federation 13->29 31 pastebin.com 104.20.68.143, 443, 49708, 49710 CLOUDFLARENETUS United States 13->31 49 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 13->49 51 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 13->51 53 Tries to harvest and steal browser information (history, passwords, etc) 17->53 signatures9
Result
Malware family:
sectoprat
Score:
  10/10
Tags:
family:sectoprat discovery rat spyware stealer trojan
Behaviour
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
SectopRAT
SectopRAT payload
Unpacked files
SH256 hash:
3ef6b85ea5ec21e5edf64014b40051a5837294c4e29684a358804d0e2c90c2b3
MD5 hash:
ff60060d1bc257fb3c4e12836e74e6dc
SHA1 hash:
798532ae880ab7391ab18bc5a501940a6f593b65
Detections:
SUSP_XORed_URL_In_EXE MALWARE_Win_Arechclient2
SH256 hash:
fd927c3c6a733cab18a4f657a605682c6d043728442d0d2fe4dd1d464fb0d7ec
MD5 hash:
0947fab2dc35b66694760c51d7073ed5
SHA1 hash:
3e2cd6875db025c07280166bdf038c872d9c9d03
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Arechclient2

Executable exe fd927c3c6a733cab18a4f657a605682c6d043728442d0d2fe4dd1d464fb0d7ec

(this sample)

Comments