Malware Analysis Report

2025-08-10 17:43

Sample ID 230322-hqnfvahc6v
Target AS000456879.exe
SHA256 d50074d48914764b355b89e387636cfbc2d5f5daf17b8afee1490c176afccfbf
Tags
asyncrat default persistence rat spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d50074d48914764b355b89e387636cfbc2d5f5daf17b8afee1490c176afccfbf

Threat Level: Known bad

The file AS000456879.exe was found to be: Known bad.

Malicious Activity Summary

asyncrat default persistence rat spyware stealer

AsyncRat

Async RAT payload

Executes dropped EXE

Loads dropped DLL

Reads user/profile data of web browsers

Adds Run key to start application

Suspicious use of SetThreadContext

Enumerates physical storage devices

Suspicious behavior: MapViewOfSection

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-03-22 06:56

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-03-22 06:56

Reported

2023-03-22 06:59

Platform

win7-20230220-en

Max time kernel

141s

Max time network

143s

Command Line

"C:\Users\Admin\AppData\Local\Temp\AS000456879.exe"

Signatures

AsyncRat

rat asyncrat

Async RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run\jfoktdyh = "C:\\Users\\Admin\\AppData\\Roaming\\pyudmirbwg\\cluqa.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\vubdwujj.exe\" C:\\Users\\Admin\\AppData\\Local\\" C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2024 set thread context of 1392 N/A C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe

Enumerates physical storage devices

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\AS000456879.exe

"C:\Users\Admin\AppData\Local\Temp\AS000456879.exe"

C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe

"C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe" C:\Users\Admin\AppData\Local\Temp\uszcl.zps

C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe

"C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe"

Network

Country Destination Domain Proto
US 172.245.251.219:2015 tcp

Files

\Users\Admin\AppData\Local\Temp\vubdwujj.exe

MD5 adba09c1a1bae1fca7a24748a8088b28
SHA1 1657b9e782e90e3ea7c97a0da9efde1568089d56
SHA256 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b
SHA512 c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492

\Users\Admin\AppData\Local\Temp\vubdwujj.exe

MD5 adba09c1a1bae1fca7a24748a8088b28
SHA1 1657b9e782e90e3ea7c97a0da9efde1568089d56
SHA256 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b
SHA512 c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492

C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe

MD5 adba09c1a1bae1fca7a24748a8088b28
SHA1 1657b9e782e90e3ea7c97a0da9efde1568089d56
SHA256 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b
SHA512 c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492

C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe

MD5 adba09c1a1bae1fca7a24748a8088b28
SHA1 1657b9e782e90e3ea7c97a0da9efde1568089d56
SHA256 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b
SHA512 c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492

C:\Users\Admin\AppData\Local\Temp\uszcl.zps

MD5 0af0a947a024be23f1ca48d932eacd1e
SHA1 747ec7d3e0879017c45b911d20b90d9e7257e90d
SHA256 429576f6e3310e8f0a0033207e8c11c565c545846dc292048feec5df38a1eca2
SHA512 b9c6cdbfc1232fb290231217dea23bca16eb1db7658f19af4fad29f72b13c033f902487df8ca27d554b5f1c3f302a2bc9ef030870b5e71a80eaa1f78aa36e5dd

C:\Users\Admin\AppData\Local\Temp\fobmxw.vq

MD5 2507ba304a6d9308621410c2d36296a7
SHA1 e25523ae784746d60c47cf06eae60cf61e988050
SHA256 aab883c874ded8ea1c747f001eca69bc9a8f8349ae7ee2dfd5e910f54bfe72f8
SHA512 9ac7f6f5baf5715001faa34ec8cc655f1af87a2515ff7f93b131d965d8f93921b34abd5874a99b7a8ba064f783cd219652913724259fae846783a1a33ef016dc

C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe

MD5 adba09c1a1bae1fca7a24748a8088b28
SHA1 1657b9e782e90e3ea7c97a0da9efde1568089d56
SHA256 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b
SHA512 c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492

\Users\Admin\AppData\Local\Temp\vubdwujj.exe

MD5 adba09c1a1bae1fca7a24748a8088b28
SHA1 1657b9e782e90e3ea7c97a0da9efde1568089d56
SHA256 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b
SHA512 c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492

memory/1392-69-0x0000000000400000-0x0000000000423000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe

MD5 adba09c1a1bae1fca7a24748a8088b28
SHA1 1657b9e782e90e3ea7c97a0da9efde1568089d56
SHA256 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b
SHA512 c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492

memory/1392-72-0x0000000000400000-0x0000000000423000-memory.dmp

memory/1392-74-0x0000000000530000-0x0000000000542000-memory.dmp

memory/1392-75-0x0000000000530000-0x0000000000542000-memory.dmp

memory/1392-76-0x0000000000400000-0x0000000000423000-memory.dmp

memory/1392-77-0x00000000046E0000-0x0000000004720000-memory.dmp

memory/1392-78-0x00000000046E0000-0x0000000004720000-memory.dmp

memory/1392-97-0x00000000046E0000-0x0000000004720000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-03-22 06:56

Reported

2023-03-22 06:59

Platform

win10v2004-20230220-en

Max time kernel

143s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\AS000456879.exe"

Signatures

AsyncRat

rat asyncrat

Async RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jfoktdyh = "C:\\Users\\Admin\\AppData\\Roaming\\pyudmirbwg\\cluqa.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\vubdwujj.exe\" C:\\Users\\Admin\\AppData\\Local\\" C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1268 set thread context of 244 N/A C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe

Enumerates physical storage devices

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\AS000456879.exe

"C:\Users\Admin\AppData\Local\Temp\AS000456879.exe"

C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe

"C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe" C:\Users\Admin\AppData\Local\Temp\uszcl.zps

C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe

"C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe"

Network

Country Destination Domain Proto
US 8.248.3.254:80 tcp
US 8.8.8.8:53 76.38.195.152.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 134.17.126.40.in-addr.arpa udp
US 8.8.8.8:53 216.74.101.95.in-addr.arpa udp
US 172.245.251.219:2015 tcp
US 8.8.8.8:53 219.251.245.172.in-addr.arpa udp
US 172.245.251.219:2015 tcp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
IE 13.69.239.74:443 tcp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 45.8.109.52.in-addr.arpa udp
US 93.184.221.240:80 tcp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
NL 173.223.113.164:443 tcp
NL 173.223.113.131:80 tcp
US 204.79.197.203:80 tcp

Files

C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe

MD5 adba09c1a1bae1fca7a24748a8088b28
SHA1 1657b9e782e90e3ea7c97a0da9efde1568089d56
SHA256 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b
SHA512 c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492

C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe

MD5 adba09c1a1bae1fca7a24748a8088b28
SHA1 1657b9e782e90e3ea7c97a0da9efde1568089d56
SHA256 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b
SHA512 c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492

C:\Users\Admin\AppData\Local\Temp\uszcl.zps

MD5 0af0a947a024be23f1ca48d932eacd1e
SHA1 747ec7d3e0879017c45b911d20b90d9e7257e90d
SHA256 429576f6e3310e8f0a0033207e8c11c565c545846dc292048feec5df38a1eca2
SHA512 b9c6cdbfc1232fb290231217dea23bca16eb1db7658f19af4fad29f72b13c033f902487df8ca27d554b5f1c3f302a2bc9ef030870b5e71a80eaa1f78aa36e5dd

memory/1268-140-0x00000000006B0000-0x00000000006B2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\fobmxw.vq

MD5 2507ba304a6d9308621410c2d36296a7
SHA1 e25523ae784746d60c47cf06eae60cf61e988050
SHA256 aab883c874ded8ea1c747f001eca69bc9a8f8349ae7ee2dfd5e910f54bfe72f8
SHA512 9ac7f6f5baf5715001faa34ec8cc655f1af87a2515ff7f93b131d965d8f93921b34abd5874a99b7a8ba064f783cd219652913724259fae846783a1a33ef016dc

memory/244-143-0x0000000000400000-0x0000000000423000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\vubdwujj.exe

MD5 adba09c1a1bae1fca7a24748a8088b28
SHA1 1657b9e782e90e3ea7c97a0da9efde1568089d56
SHA256 9fafdf42926181bee4b0e814907d060568e9578a9ac834069638c699757f2e4b
SHA512 c4b8f329eb42bd4a6ec931366a9cf44be97f406570adf4c4e328da8e032b0b5c00f1ff638760b3183607207f4297b2dc0a818c959187040c229c716a1ee74492

memory/244-145-0x0000000000400000-0x0000000000423000-memory.dmp

memory/244-146-0x0000000000400000-0x0000000000423000-memory.dmp

memory/244-147-0x0000000000400000-0x0000000000423000-memory.dmp

memory/244-149-0x0000000004960000-0x0000000004970000-memory.dmp

memory/244-150-0x0000000004960000-0x0000000004970000-memory.dmp

memory/244-151-0x0000000004960000-0x0000000004970000-memory.dmp

memory/244-152-0x0000000004960000-0x0000000004970000-memory.dmp

memory/244-153-0x0000000004BB0000-0x0000000004C4C000-memory.dmp

memory/244-154-0x0000000004C50000-0x00000000051F4000-memory.dmp

memory/244-155-0x0000000005240000-0x00000000052A6000-memory.dmp

memory/244-157-0x0000000006030000-0x00000000060A6000-memory.dmp

memory/244-158-0x0000000004960000-0x0000000004970000-memory.dmp

memory/244-159-0x0000000004960000-0x0000000004970000-memory.dmp

memory/244-160-0x0000000004960000-0x0000000004970000-memory.dmp

memory/244-161-0x0000000006120000-0x000000000613E000-memory.dmp

memory/244-162-0x0000000004960000-0x0000000004970000-memory.dmp