Malware Analysis Report

2025-08-10 17:43

Sample ID 230322-hqcpcahc6t
Target AS000456879.exe
SHA256 d50074d48914764b355b89e387636cfbc2d5f5daf17b8afee1490c176afccfbf
Tags
asyncrat persistence rat spyware stealer default
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d50074d48914764b355b89e387636cfbc2d5f5daf17b8afee1490c176afccfbf

Threat Level: Known bad

The file AS000456879.exe was found to be: Known bad.

Malicious Activity Summary

asyncrat persistence rat spyware stealer default

AsyncRat

Async RAT payload

Reads user/profile data of web browsers

Loads dropped DLL

Executes dropped EXE

Adds Run key to start application

Suspicious use of SetThreadContext

Enumerates physical storage devices

Suspicious behavior: MapViewOfSection

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-03-22 06:56

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-03-22 06:56

Reported

2023-03-22 06:58

Platform

win10v2004-20230221-en

Max time kernel

143s

Max time network

146s

Command Line

"C:\Users\Admin\AppData\Local\Temp\AS000456879.exe"

Signatures

AsyncRat

rat asyncrat

Async RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jfoktdyh = "C:\\Users\\Admin\\AppData\\Roaming\\pyudmirbwg\\cluqa.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\vubdwujj.exe\" C:\\Users\\Admin\\AppData\\Local\\" C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2768 set thread context of 1468 N/A C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe

Enumerates physical storage devices

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\AS000456879.exe

"C:\Users\Admin\AppData\Local\Temp\AS000456879.exe"

C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe

"C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe" C:\Users\Admin\AppData\Local\Temp\uszcl.zps

C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe

"C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 176.122.125.40.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 4.159.190.20.in-addr.arpa udp
US 93.184.220.29:80 tcp
US 8.8.8.8:53 199.176.139.52.in-addr.arpa udp
US 172.245.251.219:2015 tcp
US 8.8.8.8:53 219.251.245.172.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 172.245.251.219:2015 tcp
US 8.8.8.8:53 76.38.195.152.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 50.4.107.13.in-addr.arpa udp
US 20.189.173.4:443 tcp
US 8.8.8.8:53 58.104.205.20.in-addr.arpa udp
US 8.8.8.8:53 202.74.101.95.in-addr.arpa udp
US 93.184.221.240:80 tcp
US 8.8.8.8:53 126.50.247.8.in-addr.arpa udp
US 93.184.221.240:80 tcp
NL 173.223.113.164:443 tcp

Files

C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe

MD5 adba09c1a1bae1fca7a24748a8088b28
SHA1 1657b9e782e90e3ea7c97a0da9efde1568089d56
SHA256 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b
SHA512 c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492

C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe

MD5 adba09c1a1bae1fca7a24748a8088b28
SHA1 1657b9e782e90e3ea7c97a0da9efde1568089d56
SHA256 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b
SHA512 c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492

C:\Users\Admin\AppData\Local\Temp\uszcl.zps

MD5 0af0a947a024be23f1ca48d932eacd1e
SHA1 747ec7d3e0879017c45b911d20b90d9e7257e90d
SHA256 429576f6e3310e8f0a0033207e8c11c565c545846dc292048feec5df38a1eca2
SHA512 b9c6cdbfc1232fb290231217dea23bca16eb1db7658f19af4fad29f72b13c033f902487df8ca27d554b5f1c3f302a2bc9ef030870b5e71a80eaa1f78aa36e5dd

C:\Users\Admin\AppData\Local\Temp\fobmxw.vq

MD5 2507ba304a6d9308621410c2d36296a7
SHA1 e25523ae784746d60c47cf06eae60cf61e988050
SHA256 aab883c874ded8ea1c747f001eca69bc9a8f8349ae7ee2dfd5e910f54bfe72f8
SHA512 9ac7f6f5baf5715001faa34ec8cc655f1af87a2515ff7f93b131d965d8f93921b34abd5874a99b7a8ba064f783cd219652913724259fae846783a1a33ef016dc

memory/1468-142-0x0000000000400000-0x0000000000423000-memory.dmp

memory/1468-144-0x0000000000400000-0x0000000000423000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe

MD5 adba09c1a1bae1fca7a24748a8088b28
SHA1 1657b9e782e90e3ea7c97a0da9efde1568089d56
SHA256 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b
SHA512 c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492

memory/1468-145-0x0000000000400000-0x0000000000423000-memory.dmp

memory/1468-147-0x0000000000400000-0x0000000000423000-memory.dmp

memory/1468-148-0x0000000004A60000-0x0000000004A70000-memory.dmp

memory/1468-149-0x0000000004A60000-0x0000000004A70000-memory.dmp

memory/1468-150-0x0000000004A60000-0x0000000004A70000-memory.dmp

memory/1468-151-0x0000000004EF0000-0x0000000004F8C000-memory.dmp

memory/1468-152-0x0000000004F90000-0x0000000005534000-memory.dmp

memory/1468-153-0x0000000005580000-0x00000000055E6000-memory.dmp

memory/1468-157-0x0000000004A60000-0x0000000004A70000-memory.dmp

memory/1468-156-0x0000000004A60000-0x0000000004A70000-memory.dmp

memory/1468-155-0x0000000004A60000-0x0000000004A70000-memory.dmp

memory/1468-158-0x0000000006170000-0x00000000061E6000-memory.dmp

memory/1468-159-0x0000000004A60000-0x0000000004A70000-memory.dmp

memory/1468-160-0x0000000006260000-0x000000000627E000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2023-03-22 06:56

Reported

2023-03-22 06:58

Platform

win7-20230220-en

Max time kernel

141s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\AS000456879.exe"

Signatures

AsyncRat

rat asyncrat

Async RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run\jfoktdyh = "C:\\Users\\Admin\\AppData\\Roaming\\pyudmirbwg\\cluqa.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\vubdwujj.exe\" C:\\Users\\Admin\\AppData\\Local\\" C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1172 set thread context of 1400 N/A C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe

Enumerates physical storage devices

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\AS000456879.exe

"C:\Users\Admin\AppData\Local\Temp\AS000456879.exe"

C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe

"C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe" C:\Users\Admin\AppData\Local\Temp\uszcl.zps

C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe

"C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe"

Network

Country Destination Domain Proto
US 172.245.251.219:2015 tcp
US 172.245.251.219:2015 tcp

Files

\Users\Admin\AppData\Local\Temp\vubdwujj.exe

MD5 adba09c1a1bae1fca7a24748a8088b28
SHA1 1657b9e782e90e3ea7c97a0da9efde1568089d56
SHA256 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b
SHA512 c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492

\Users\Admin\AppData\Local\Temp\vubdwujj.exe

MD5 adba09c1a1bae1fca7a24748a8088b28
SHA1 1657b9e782e90e3ea7c97a0da9efde1568089d56
SHA256 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b
SHA512 c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492

C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe

MD5 adba09c1a1bae1fca7a24748a8088b28
SHA1 1657b9e782e90e3ea7c97a0da9efde1568089d56
SHA256 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b
SHA512 c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492

C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe

MD5 adba09c1a1bae1fca7a24748a8088b28
SHA1 1657b9e782e90e3ea7c97a0da9efde1568089d56
SHA256 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b
SHA512 c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492

C:\Users\Admin\AppData\Local\Temp\uszcl.zps

MD5 0af0a947a024be23f1ca48d932eacd1e
SHA1 747ec7d3e0879017c45b911d20b90d9e7257e90d
SHA256 429576f6e3310e8f0a0033207e8c11c565c545846dc292048feec5df38a1eca2
SHA512 b9c6cdbfc1232fb290231217dea23bca16eb1db7658f19af4fad29f72b13c033f902487df8ca27d554b5f1c3f302a2bc9ef030870b5e71a80eaa1f78aa36e5dd

C:\Users\Admin\AppData\Local\Temp\fobmxw.vq

MD5 2507ba304a6d9308621410c2d36296a7
SHA1 e25523ae784746d60c47cf06eae60cf61e988050
SHA256 aab883c874ded8ea1c747f001eca69bc9a8f8349ae7ee2dfd5e910f54bfe72f8
SHA512 9ac7f6f5baf5715001faa34ec8cc655f1af87a2515ff7f93b131d965d8f93921b34abd5874a99b7a8ba064f783cd219652913724259fae846783a1a33ef016dc

C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe

MD5 adba09c1a1bae1fca7a24748a8088b28
SHA1 1657b9e782e90e3ea7c97a0da9efde1568089d56
SHA256 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b
SHA512 c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492

\Users\Admin\AppData\Local\Temp\vubdwujj.exe

MD5 adba09c1a1bae1fca7a24748a8088b28
SHA1 1657b9e782e90e3ea7c97a0da9efde1568089d56
SHA256 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b
SHA512 c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492

memory/1400-69-0x0000000000400000-0x0000000000423000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe

MD5 adba09c1a1bae1fca7a24748a8088b28
SHA1 1657b9e782e90e3ea7c97a0da9efde1568089d56
SHA256 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b
SHA512 c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492

memory/1400-72-0x0000000000400000-0x0000000000423000-memory.dmp

memory/1400-74-0x0000000000310000-0x0000000000322000-memory.dmp

memory/1400-75-0x0000000000400000-0x0000000000423000-memory.dmp

memory/1400-76-0x0000000004580000-0x00000000045C0000-memory.dmp

memory/1400-77-0x0000000004580000-0x00000000045C0000-memory.dmp

memory/1400-96-0x0000000005D20000-0x0000000005D88000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

MD5 e71c8443ae0bc2e282c73faead0a6dd3
SHA1 0c110c1b01e68edfacaeae64781a37b1995fa94b
SHA256 95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512 b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

C:\Users\Admin\AppData\Local\Temp\Tar4449.tmp

MD5 be2bec6e8c5653136d3e72fe53c98aa3
SHA1 a8182d6db17c14671c3d5766c72e58d87c0810de
SHA256 1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA512 0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

memory/1400-117-0x0000000004AF0000-0x0000000004AFA000-memory.dmp

memory/1400-118-0x0000000005D90000-0x0000000005E20000-memory.dmp

memory/1400-119-0x0000000005E20000-0x0000000005E80000-memory.dmp