Overview
overview
10Static
static
10AsyncRAT v...nt.exe
windows7-x64
10AsyncRAT v...nt.exe
windows10-2004-x64
10AsyncRAT v...AT.exe
windows7-x64
10AsyncRAT v...AT.exe
windows10-2004-x64
10AsyncRAT v...er.bat
windows7-x64
1AsyncRAT v...er.bat
windows10-2004-x64
1AsyncRAT v...at.dll
windows7-x64
1AsyncRAT v...at.dll
windows10-2004-x64
1AsyncRAT v...ra.dll
windows7-x64
1AsyncRAT v...ra.dll
windows10-2004-x64
1AsyncRAT v...er.dll
windows7-x64
1AsyncRAT v...er.dll
windows10-2004-x64
1AsyncRAT v...er.dll
windows7-x64
1AsyncRAT v...er.dll
windows10-2004-x64
1AsyncRAT v...er.dll
windows7-x64
1AsyncRAT v...er.dll
windows10-2004-x64
1AsyncRAT v...us.dll
windows7-x64
1AsyncRAT v...us.dll
windows10-2004-x64
1AsyncRAT v...ns.dll
windows7-x64
1AsyncRAT v...ns.dll
windows10-2004-x64
1AsyncRAT v...er.dll
windows7-x64
1AsyncRAT v...er.dll
windows10-2004-x64
1AsyncRAT v...ry.dll
windows7-x64
1AsyncRAT v...ry.dll
windows10-2004-x64
1AsyncRAT v...ra.dll
windows7-x64
1AsyncRAT v...ra.dll
windows10-2004-x64
1AsyncRAT v...op.dll
windows7-x64
1AsyncRAT v...op.dll
windows10-2004-x64
1AsyncRAT v...le.dll
windows7-x64
1AsyncRAT v...le.dll
windows10-2004-x64
1AsyncRAT v...ry.dll
windows7-x64
1AsyncRAT v...ry.dll
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 16:25
Behavioral task
behavioral1
Sample
AsyncRAT v2.1/AsyncClient.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AsyncRAT v2.1/AsyncClient.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
AsyncRAT v2.1/AsyncRAT.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
AsyncRAT v2.1/AsyncRAT.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
AsyncRAT v2.1/Fixer.bat
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
AsyncRAT v2.1/Fixer.bat
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
AsyncRAT v2.1/Plugins/Chat.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
AsyncRAT v2.1/Plugins/Chat.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
AsyncRAT v2.1/Plugins/Extra.dll
Resource
win7-20250207-en
Behavioral task
behavioral10
Sample
AsyncRAT v2.1/Plugins/Extra.dll
Resource
win10v2004-20250313-en
Behavioral task
behavioral11
Sample
AsyncRAT v2.1/Plugins/FileManager.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
AsyncRAT v2.1/Plugins/FileManager.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
AsyncRAT v2.1/Plugins/FileSearcher.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
AsyncRAT v2.1/Plugins/FileSearcher.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
AsyncRAT v2.1/Plugins/LimeLogger.dll
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
AsyncRAT v2.1/Plugins/LimeLogger.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
AsyncRAT v2.1/Plugins/Miscellaneous.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
AsyncRAT v2.1/Plugins/Miscellaneous.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
AsyncRAT v2.1/Plugins/Options.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
AsyncRAT v2.1/Plugins/Options.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
AsyncRAT v2.1/Plugins/ProcessManager.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
AsyncRAT v2.1/Plugins/ProcessManager.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
AsyncRAT v2.1/Plugins/Recovery.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
AsyncRAT v2.1/Plugins/Recovery.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
AsyncRAT v2.1/Plugins/RemoteCamera.dll
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
AsyncRAT v2.1/Plugins/RemoteCamera.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
AsyncRAT v2.1/Plugins/RemoteDesktop.dll
Resource
win7-20241023-en
Behavioral task
behavioral28
Sample
AsyncRAT v2.1/Plugins/RemoteDesktop.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
AsyncRAT v2.1/Plugins/SendFile.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
AsyncRAT v2.1/Plugins/SendFile.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
AsyncRAT v2.1/Plugins/SendMemory.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
AsyncRAT v2.1/Plugins/SendMemory.dll
Resource
win10v2004-20250314-en
General
-
Target
AsyncRAT v2.1/AsyncRAT.exe
-
Size
6.0MB
-
MD5
34c62e8ffbe11193392c51872444deaa
-
SHA1
b7920bb0a3f068f0a261f643c968895b858f04ef
-
SHA256
e35bf51c40c50f326fb71764c23679be6df7bf8f67616bd5329c9948901a251e
-
SHA512
f2ebde604b43e96e24c5107a25383f720990bbe7ff808f0b1a51ec8b0d660cf8fd4b4417ace05e6181fc05cafde1b30d3e074b0c3f0ea31926d80c8d2e813a6b
-
SSDEEP
98304:7arL7Q+u1R8ubXx4dUeG3wBPKS8IbwIFcNZLQMe3tTJ0HZGCFgM:0A+u1R8OGdm3m+rQD9F0kCFgM
Malware Config
Extracted
asyncrat
0.5.7B
Default
mimihard.ddns.net:5353
mimihard.ddns.net:1900
mimihard.ddns.net:5355
mimihard.ddns.net:61025
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
taskhostw.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral4/files/0x000700000002425c-18.dat family_asyncrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation Scinhgekba.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation AsyncRAT.exe -
Executes dropped EXE 3 IoCs
pid Process 5180 Tojulvfveuxe.exe 3704 Scinhgekba.exe 4428 taskhostw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Scinhgekba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhostw.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 464 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 232 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe 3704 Scinhgekba.exe 3704 Scinhgekba.exe 3704 Scinhgekba.exe 3704 Scinhgekba.exe 3704 Scinhgekba.exe 3704 Scinhgekba.exe 3704 Scinhgekba.exe 3704 Scinhgekba.exe 3704 Scinhgekba.exe 3704 Scinhgekba.exe 3704 Scinhgekba.exe 3704 Scinhgekba.exe 3704 Scinhgekba.exe 3704 Scinhgekba.exe 3704 Scinhgekba.exe 3704 Scinhgekba.exe 3704 Scinhgekba.exe 3704 Scinhgekba.exe 3704 Scinhgekba.exe 3704 Scinhgekba.exe 3704 Scinhgekba.exe 3704 Scinhgekba.exe 3704 Scinhgekba.exe 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe 5180 Tojulvfveuxe.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3704 Scinhgekba.exe Token: SeDebugPrivilege 4428 taskhostw.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5180 Tojulvfveuxe.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 5180 Tojulvfveuxe.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 5900 wrote to memory of 5180 5900 AsyncRAT.exe 88 PID 5900 wrote to memory of 5180 5900 AsyncRAT.exe 88 PID 5900 wrote to memory of 3704 5900 AsyncRAT.exe 89 PID 5900 wrote to memory of 3704 5900 AsyncRAT.exe 89 PID 5900 wrote to memory of 3704 5900 AsyncRAT.exe 89 PID 3704 wrote to memory of 5004 3704 Scinhgekba.exe 95 PID 3704 wrote to memory of 5004 3704 Scinhgekba.exe 95 PID 3704 wrote to memory of 5004 3704 Scinhgekba.exe 95 PID 3704 wrote to memory of 3808 3704 Scinhgekba.exe 97 PID 3704 wrote to memory of 3808 3704 Scinhgekba.exe 97 PID 3704 wrote to memory of 3808 3704 Scinhgekba.exe 97 PID 5004 wrote to memory of 232 5004 cmd.exe 99 PID 5004 wrote to memory of 232 5004 cmd.exe 99 PID 5004 wrote to memory of 232 5004 cmd.exe 99 PID 3808 wrote to memory of 464 3808 cmd.exe 100 PID 3808 wrote to memory of 464 3808 cmd.exe 100 PID 3808 wrote to memory of 464 3808 cmd.exe 100 PID 3808 wrote to memory of 4428 3808 cmd.exe 104 PID 3808 wrote to memory of 4428 3808 cmd.exe 104 PID 3808 wrote to memory of 4428 3808 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\AsyncRAT v2.1\AsyncRAT.exe"C:\Users\Admin\AppData\Local\Temp\AsyncRAT v2.1\AsyncRAT.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5900 -
C:\Users\Admin\AppData\Local\Temp\Tojulvfveuxe.exe"C:\Users\Admin\AppData\Local\Temp\Tojulvfveuxe.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5180
-
-
C:\Users\Admin\AppData\Local\Temp\Scinhgekba.exe"C:\Users\Admin\AppData\Local\Temp\Scinhgekba.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "taskhostw" /tr '"C:\Users\Admin\AppData\Roaming\taskhostw.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "taskhostw" /tr '"C:\Users\Admin\AppData\Roaming\taskhostw.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:232
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp5E9B.tmp.bat""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:464
-
-
C:\Users\Admin\AppData\Roaming\taskhostw.exe"C:\Users\Admin\AppData\Roaming\taskhostw.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024KB
MD58904b6100dd8e7d1f9d42a7fdc8c936a
SHA153e9a52df26a038e9282ca49be93698d6041f622
SHA2563a3d7f82a905d2577fb5cdbb29e00805500b80ce0703bf2baf6ccd21996fa47c
SHA512b2dbac867df4a00717c717aaca7025b439110514723bb846ea7929d5a006dfca406aa7d57cd434c7ab424ecfc617dfc4f1f94f1fef66e2ddefda62f9f392f8e3
-
Filesize
6.4MB
MD536e71813a30b96f64943eb8cea2c52ec
SHA1838f8938ff5f6e2daa8975bbd2af3e785bf4cd8b
SHA256bb1f2c2c9b279790b67eaea6ab0bbce3a4d4432bbe1bd716750f2f9ba3337f7e
SHA512953bc81e1f6c27763f84a1599cd92e3f30aed9217589b4c47bd0ca802df7ceff903e14f87a96f2247cde8e8ed0ebfa3dbd840abb6c243b798cc0a19791296b85
-
Filesize
153B
MD560e6b51bbba751eb66111337f070abfc
SHA1e69226e7de47397fc92d9ae4d8f2e30e0b2c19cd
SHA25636eabd80a4d0b0f814ee03b3b27415a9738ea60e093c9e7615434a2a1a5c092f
SHA512fdce93905387267851165307c3780004bf642998f7fc89cf592f0b12e96db11d3c2712dc25503d2d17d6ef2a276454d85c3477de704e50c38cdf0f5bd334846f