Click to jump to signature section
Source: WN3Y9XR9c7.exe | Malware Configuration Extractor: AsyncRAT {"External_config_on_Pastebin": "null", "Server": "hellonew2025.kozow.com", "Ports": "6606,7707,8808,6666,7777", "Version": "| Edit by Vinom Rat", "Autorun": "false", "Install_Folder": "R3huQjdQUWpPbWZ6MTlKdkZwbjFrSnlBYzhwNW1lbnE=", "Install_File": "rdJdKIBGOpuOWllNDaXHNEvkvJo22F0zDwETw/NoXgXuFRsRaD3lzECtbo86y2xCt9aVPHpdlhhO0DF/rcdkbJ1JXZpXjEGlRASzkQ8aUgY=", "AES_key": "GxnB7PQjOmfz19JvFpn1kJyAc8p5menq", "Mutex": "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", "Certificate": "false", "ServerSignature": "true", "BDOS": "false", "Startup_Delay": "3", "Group": "null"} |
Source: WN3Y9XR9c7.exe | ReversingLabs: Detection: 78% |
Source: WN3Y9XR9c7.exe | Virustotal: Detection: 66% | Perma Link |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 100.0% probability |
Source: WN3Y9XR9c7.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: WN3Y9XR9c7.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: Network traffic | Suricata IDS: 2842478 - Severity 1 - ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) : 207.32.218.35:6666 -> 192.168.2.4:49730 |
Source: Network traffic | Suricata IDS: 2030673 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) : 207.32.218.35:6666 -> 192.168.2.4:49730 |
Source: Network traffic | Suricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 207.32.218.35:6666 -> 192.168.2.4:49730 |
Source: Network traffic | Suricata IDS: 2035607 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) : 207.32.218.35:6666 -> 192.168.2.4:49730 |
Source: Malware configuration extractor | URLs: hellonew2025.kozow.com |
Source: Yara match | File source: WN3Y9XR9c7.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.WN3Y9XR9c7.exe.540000.0.unpack, type: UNPACKEDPE |
Source: global traffic | TCP traffic: 192.168.2.4:49730 -> 207.32.218.35:6666 |
Source: global traffic | TCP traffic: 192.168.2.4:58445 -> 1.1.1.1:53 |
Source: Joe Sandbox View | ASN Name: 1GSERVERSUS 1GSERVERSUS |
Source: unknown | TCP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | TCP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | TCP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | TCP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | DNS traffic detected: DNS query: hellonew2025.kozow.com |
Source: WN3Y9XR9c7.exe, 00000000.00000002.4109516170.0000000000A51000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.0.dr | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab |
Source: WN3Y9XR9c7.exe, 00000000.00000002.4109516170.0000000000A9C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/ents |
Source: WN3Y9XR9c7.exe, 00000000.00000002.4110500447.00000000029A1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: Yara match | File source: WN3Y9XR9c7.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.WN3Y9XR9c7.exe.540000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000000.1653920370.0000000000542000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.4110500447.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: WN3Y9XR9c7.exe PID: 7340, type: MEMORYSTR |
Source: WN3Y9XR9c7.exe, type: SAMPLE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: WN3Y9XR9c7.exe, type: SAMPLE | Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io |
Source: WN3Y9XR9c7.exe, type: SAMPLE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 0.0.WN3Y9XR9c7.exe.540000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 0.0.WN3Y9XR9c7.exe.540000.0.unpack, type: UNPACKEDPE | Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io |
Source: 0.0.WN3Y9XR9c7.exe.540000.0.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000000.00000000.1653920370.0000000000542000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 00000000.00000000.1653920370.0000000000542000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: Process Memory Space: WN3Y9XR9c7.exe PID: 7340, type: MEMORYSTR | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: C:\Users\user\Desktop\WN3Y9XR9c7.exe | Code function: 0_2_00C8E048 | 0_2_00C8E048 |
Source: C:\Users\user\Desktop\WN3Y9XR9c7.exe | Code function: 0_2_06DD1B10 | 0_2_06DD1B10 |
Source: WN3Y9XR9c7.exe, 00000000.00000002.4112573796.00000000053C9000.00000004.00000010.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameUNKNOWN_FILET vs WN3Y9XR9c7.exe |
Source: WN3Y9XR9c7.exe, 00000000.00000000.1653920370.0000000000542000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameStub.exe" vs WN3Y9XR9c7.exe |
Source: WN3Y9XR9c7.exe | Binary or memory string: OriginalFilenameStub.exe" vs WN3Y9XR9c7.exe |
Source: WN3Y9XR9c7.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: WN3Y9XR9c7.exe, type: SAMPLE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: WN3Y9XR9c7.exe, type: SAMPLE | Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb |
Source: WN3Y9XR9c7.exe, type: SAMPLE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 0.0.WN3Y9XR9c7.exe.540000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 0.0.WN3Y9XR9c7.exe.540000.0.unpack, type: UNPACKEDPE | Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb |
Source: 0.0.WN3Y9XR9c7.exe.540000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000000.00000000.1653920370.0000000000542000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 00000000.00000000.1653920370.0000000000542000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: Process Memory Space: WN3Y9XR9c7.exe PID: 7340, type: MEMORYSTR | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: WN3Y9XR9c7.exe, PUfZINxuvqDfKifX.cs | Base64 encoded string: 'qHLM+lEU9IN/FwEGYD81WFgSsboLobhjuYtq4+WQwFq6J1KtoebeXpb5QEzpw6XE7YrhrCuZnKRTkgmMDGfK/rp2pZGRGG5y/YvLIYpjHlA=', 'NwmeDKFXx4fBmRrJ/JPZYxdzjs+jKbXwodzTfuJtQdbb4niwPRkgTIDMrFOJJjx3zVaV/+D4nI2gUrjQ922SoggIL1mNH97KcEhNbEz1ESg=', 'rdJdKIBGOpuOWllNDaXHNEvkvJo22F0zDwETw/NoXgXuFRsRaD3lzECtbo86y2xCt9aVPHpdlhhO0DF/rcdkbJ1JXZpXjEGlRASzkQ8aUgY=', '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 |