Click to jump to signature section
Source: jAjWw92QKR.exe | Malware Configuration Extractor: AsyncRAT {"External_config_on_Pastebin": "null", "Server": "46.253.4.252", "Ports": "6606", "Version": "0.5.8", "Autorun": "false", "Install_Folder": "Bonjur.exe", "Install_File": "MU1PRnh3MndPTmFCVUIxWlZXNlZ5YnRmRWNMWEtjMVc="} |
Source: jAjWw92QKR.exe | ReversingLabs: Detection: 89% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 100.0% probability |
Source: jAjWw92QKR.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: jAjWw92QKR.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: Network traffic | Suricata IDS: 2842478 - Severity 1 - ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) : 46.253.4.252:6606 -> 192.168.2.4:49730 |
Source: Network traffic | Suricata IDS: 2030673 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) : 46.253.4.252:6606 -> 192.168.2.4:49730 |
Source: Network traffic | Suricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 46.253.4.252:6606 -> 192.168.2.4:49730 |
Source: Network traffic | Suricata IDS: 2035607 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) : 46.253.4.252:6606 -> 192.168.2.4:49730 |
Source: Network traffic | Suricata IDS: 2842478 - Severity 1 - ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) : 46.253.4.252:6606 -> 192.168.2.4:49798 |
Source: Yara match | File source: jAjWw92QKR.exe, type: SAMPLE |
Source: global traffic | TCP traffic: 192.168.2.4:49730 -> 46.253.4.252:6606 |
Source: Joe Sandbox View | ASN Name: BTEL-BG-ASBG BTEL-BG-ASBG |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: unknown | TCP traffic detected without corresponding DNS query: 46.253.4.252 |
Source: jAjWw92QKR.exe, 00000000.00000002.2945450344.0000000000DD7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en |
Source: jAjWw92QKR.exe, 00000000.00000002.2945450344.0000000000E1A000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.0.dr | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab |
Source: jAjWw92QKR.exe, 00000000.00000002.2946371088.0000000002A81000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: Yara match | File source: jAjWw92QKR.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.jAjWw92QKR.exe.710000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000000.1701128846.0000000000712000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.2946371088.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: jAjWw92QKR.exe PID: 6896, type: MEMORYSTR |
Source: jAjWw92QKR.exe, type: SAMPLE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: jAjWw92QKR.exe, type: SAMPLE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: dump.pcap, type: PCAP | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 0.0.jAjWw92QKR.exe.710000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 0.0.jAjWw92QKR.exe.710000.0.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000000.00000002.2955367887.0000000005075000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 00000000.00000000.1701128846.0000000000712000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000000.00000002.2945450344.0000000000E1A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 00000000.00000002.2945450344.0000000000DD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 00000000.00000002.2946371088.0000000002ABA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: 00000000.00000002.2946371088.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: Process Memory Space: jAjWw92QKR.exe PID: 6896, type: MEMORYSTR | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: Process Memory Space: jAjWw92QKR.exe PID: 6896, type: MEMORYSTR | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: C:\Users\user\Desktop\jAjWw92QKR.exe | Code function: 0_2_00C11F22 | 0_2_00C11F22 |
Source: C:\Users\user\Desktop\jAjWw92QKR.exe | Code function: 0_2_00C11F30 | 0_2_00C11F30 |
Source: C:\Users\user\Desktop\jAjWw92QKR.exe | Code function: 0_2_00F19BD0 | 0_2_00F19BD0 |
Source: C:\Users\user\Desktop\jAjWw92QKR.exe | Code function: 0_2_00F1A330 | 0_2_00F1A330 |
Source: C:\Users\user\Desktop\jAjWw92QKR.exe | Code function: 0_2_00F17478 | 0_2_00F17478 |
Source: C:\Users\user\Desktop\jAjWw92QKR.exe | Code function: 0_2_00F15C00 | 0_2_00F15C00 |
Source: C:\Users\user\Desktop\jAjWw92QKR.exe | Code function: 0_2_00F140E0 | 0_2_00F140E0 |
Source: C:\Users\user\Desktop\jAjWw92QKR.exe | Code function: 0_2_00F1B050 | 0_2_00F1B050 |
Source: C:\Users\user\Desktop\jAjWw92QKR.exe | Code function: 0_2_00F12AA8 | 0_2_00F12AA8 |
Source: C:\Users\user\Desktop\jAjWw92QKR.exe | Code function: 0_2_00F14BF8 | 0_2_00F14BF8 |
Source: C:\Users\user\Desktop\jAjWw92QKR.exe | Code function: 0_2_028AC118 | 0_2_028AC118 |
Source: C:\Users\user\Desktop\jAjWw92QKR.exe | Code function: 0_2_028AC478 | 0_2_028AC478 |
Source: C:\Users\user\Desktop\jAjWw92QKR.exe | Code function: 0_2_028A65C0 | 0_2_028A65C0 |
Source: C:\Users\user\Desktop\jAjWw92QKR.exe | Code function: 0_2_028A5CF0 | 0_2_028A5CF0 |
Source: C:\Users\user\Desktop\jAjWw92QKR.exe | Code function: 0_2_028AC3A0 | 0_2_028AC3A0 |
Source: C:\Users\user\Desktop\jAjWw92QKR.exe | Code function: 0_2_028AC108 | 0_2_028AC108 |
Source: C:\Users\user\Desktop\jAjWw92QKR.exe | Code function: 0_2_028AC468 | 0_2_028AC468 |
Source: C:\Users\user\Desktop\jAjWw92QKR.exe | Code function: 0_2_028AA878 | 0_2_028AA878 |
Source: C:\Users\user\Desktop\jAjWw92QKR.exe | Code function: 0_2_028A59A8 | 0_2_028A59A8 |
Source: C:\Users\user\Desktop\jAjWw92QKR.exe | Code function: 0_2_0712E0C0 | 0_2_0712E0C0 |
Source: jAjWw92QKR.exe, 00000000.00000002.2957735676.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp | Binary or memory string: OriginalFilenameRemoteDesktop.dll" vs jAjWw92QKR.exe |
Source: jAjWw92QKR.exe, 00000000.00000000.1701128846.000000000071E000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameStub.exe" vs jAjWw92QKR.exe |
Source: jAjWw92QKR.exe, 00000000.00000002.2954308452.0000000003A87000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameRemoteDesktop.dll" vs jAjWw92QKR.exe |
Source: jAjWw92QKR.exe | Binary or memory string: OriginalFilenameStub.exe" vs jAjWw92QKR.exe |
Source: jAjWw92QKR.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: jAjWw92QKR.exe, type: SAMPLE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: jAjWw92QKR.exe, type: SAMPLE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: dump.pcap, type: PCAP | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 0.0.jAjWw92QKR.exe.710000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 0.0.jAjWw92QKR.exe.710000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000000.00000002.2955367887.0000000005075000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 00000000.00000000.1701128846.0000000000712000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000000.00000002.2945450344.0000000000E1A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 00000000.00000002.2945450344.0000000000DD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 00000000.00000002.2946371088.0000000002ABA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 00000000.00000002.2946371088.0000000002A81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: Process Memory Space: jAjWw92QKR.exe PID: 6896, type: MEMORYSTR | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: Process Memory Space: jAjWw92QKR.exe PID: 6896, type: MEMORYSTR | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 0.2.jAjWw92QKR.exe.3b5b878.0.raw.unpack, ziMWyOoZyUZMaIOvjHCE.cs | Cryptographic APIs: 'CreateDecryptor' |
Source: 0.2.jAjWw92QKR.exe.3b5b878.0.raw.unpack, ziMWyOoZyUZMaIOvjHCE.cs | Cryptographic APIs: 'CreateDecryptor' |
Source: 0.2.jAjWw92QKR.exe.6bd0000.1.raw.unpack, ziMWyOoZyUZMaIOvjHCE.cs | Cryptographic APIs: 'CreateDecryptor' |
Source: 0.2.jAjWw92QKR.exe.6bd0000.1.raw.unpack, ziMWyOoZyUZMaIOvjHCE.cs | Cryptographic APIs: 'CreateDecryptor' |
Source: jAjWw92QKR.exe, jvKrNltjfdZhx.cs | Base64 encoded string: 'N0m+ZaMBZTUenc75zBMytMyWUEX5xZFcLgv8BKStcSqMASe4HikiA4pQwoMtLhdcXtxYITweK/n40Dv78IPPFQ==', 'TNc0PODsgmsnpD44FSK0DhcF0MMu/wZXBGbtxELpsERsWjpHgf4Co0/oFjS6aococ5A8mp7OTDo9I56O2z+7Fg==', 'VK271aMTschO6lEG/lykXW433Und6Uw4LvsjzVWZi0cKIyY3Cak4Zu1Jc6kAQ9SwCNVI1E9MzGwf6qjdAC6H0g==', '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 |