| File name: | 4363463463464363463463463.exe |
| Full analysis: | https://app.any.run/tasks/d4d485d3-27fb-4153-846b-04bb0f171945 |
| Verdict: | Malicious activity |
| Threats: | AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions. |
| Analysis date: | February 29, 2024, 18:54:35 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | 2A94F3960C58C6E70826495F76D00B85 |
| SHA1: | E2A1A5641295F5EBF01A37AC1C170AC0814BB71A |
| SHA256: | 2FCAD226B17131DA4274E1B9F8F31359BDD325C9568665F08FD1F6C5D06A23CE |
| SSDEEP: | 192:2we8sGKE6MqyG7c20L7BIW12n/ePSmzkTInu8stYcFwVc03KY:9e8sGKfMqyGg20PKn/cRaInuptYcFwVY |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (82.9) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (7.4) |
| .exe | | | Win32 Executable (generic) (5.1) |
| .exe | | | Generic Win/DOS Executable (2.2) |
| .exe | | | DOS Executable Generic (2.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:12:22 08:29:10+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32 |
| LinkerVersion: | 80 |
| CodeSize: | 5632 |
| InitializedDataSize: | 4608 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x3552 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows command line |
| FileVersionNumber: | 0.0.0.0 |
| ProductVersionNumber: | 0.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| FileDescription: | |
| FileVersion: | 0.0.0.0 |
| InternalName: | 4363463463464363463463463.exe |
| LegalCopyright: | |
| OriginalFileName: | 4363463463464363463463463.exe |
| ProductVersion: | 0.0.0.0 |
| AssemblyVersion: | 0.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 116 | "C:\Users\admin\Desktop\4363463463464363463463463.exe" | C:\Users\admin\Desktop\4363463463464363463463463.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Exit code: 3221226540 Version: 0.0.0.0 Modules
| |||||||||||||||
| 116 | C:\Users\admin\AppData\Local\Temp\2722617096.exe | C:\Users\admin\AppData\Local\Temp\2722617096.exe | — | pei.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 120 | "C:\Windows\svchost.com" "C:\Users\admin\Desktop\Files\NINJA.exe" | C:\Windows\svchost.com | — | wscript.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 | |||||||||||||||
| 120 | "C:\Windows\svchost.com" "C:\Users\admin\Desktop\Files\NINJA.exe" | C:\Windows\svchost.com | — | wscript.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 | |||||||||||||||
| 120 | "C:\Windows\svchost.com" "C:\Users\admin\Desktop\Files\NINJA.exe" | C:\Windows\svchost.com | — | wscript.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 | |||||||||||||||
| 124 | "C:\Windows\svchost.com" "C:\Users\admin\Desktop\Files\NINJA.exe" | C:\Windows\svchost.com | — | wscript.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 | |||||||||||||||
| 128 | "C:\Windows\svchost.com" "C:\Users\admin\Desktop\Files\NINJA.exe" | C:\Windows\svchost.com | — | wscript.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 | |||||||||||||||
| 240 | C:\Users\admin\Desktop\Files\NINJA.exe | C:\Users\admin\Desktop\Files\NINJA.exe | — | svchost.com | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 | |||||||||||||||
| 240 | C:\Users\admin\Desktop\Files\NINJA.exe | C:\Users\admin\Desktop\Files\NINJA.exe | — | svchost.com | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 | |||||||||||||||
| 240 | C:\Users\admin\Desktop\Files\NINJA.exe | C:\Users\admin\Desktop\Files\NINJA.exe | — | svchost.com | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 | |||||||||||||||
| (PID) Process: | (3784) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (3784) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (3784) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (3784) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (3784) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (3784) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (3784) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (3784) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (3784) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (3784) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\4363463463464363463463463_RASMANCS |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2592 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\Files\fd1.exe | executable | |
MD5:B9A42052C81229DE87B90370C7E8EF56 | SHA256:2799308C4B285F662D2954B3D9900951D74AE0CDDE04B80FF865221817103F3B | |||
| 2832 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\Files\pinf.exe | executable | |
MD5:2EA6C5E97869622DFE70D2B34DAF564E | SHA256:5F28BBA8BD23CDB5C8A3FA018727BCF365EAF31C06B7BC8D3F3097A85DB037F3 | |||
| 2980 | pei.exe | C:\Users\admin\AppData\Local\Temp\2722617096.exe | executable | |
MD5:BB3D7BD66C92454429A8C78BF64F977B | SHA256:94A66EEA65EDD08CA19BF6DB266058E81714312B6A51892298B461FFD8B90161 | |||
| 3988 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\Files\pei.exe | executable | |
MD5:62B97CF4C0ABAFEDA36E3FC101A5A022 | SHA256:E172537ADCEE1FCDC8F16C23E43A5AC82C56A0347FA0197C08BE979438A534AB | |||
| 2776 | pinf.exe | C:\Users\admin\AppData\Local\Temp\1357116943.exe | executable | |
MD5:BB3D7BD66C92454429A8C78BF64F977B | SHA256:94A66EEA65EDD08CA19BF6DB266058E81714312B6A51892298B461FFD8B90161 | |||
| 2088 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\Files\miner.exe | executable | |
MD5:CAFEAB1513FF424CC79CAECA170678D1 | SHA256:71F7D548C9EA57B8C9DCC3F426ADABDDDB4451E65837B63C4C25DC2A812717E2 | |||
| 1820 | clip.exe | C:\Users\admin\AppData\Roaming\System32\taskhost.exe | executable | |
MD5:04EBDDCC3A90B6512AEF4AA2EEE36624 | SHA256:1C4B1ACF31EC2DD48C746AD7CF2CC1404C76C7492BD15A6953F2CE6991496856 | |||
| 784 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\Files\cayV0Deo9jSt417.exe | executable | |
MD5:AA3CDD5145D9FB980C061D2D8653FA8D | SHA256:41376827BA300374727D29048920CA2A2D9F20B929E964098181981581E47AF2 | |||
| 2980 | pei.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\newtpp[1].exe | executable | |
MD5:BB3D7BD66C92454429A8C78BF64F977B | SHA256:94A66EEA65EDD08CA19BF6DB266058E81714312B6A51892298B461FFD8B90161 | |||
| 2928 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\Files\sc.exe | executable | |
MD5:E86471DA9E0244D1D5E29B15FC9FEB80 | SHA256:50DD267B25062A6C94DE3976D9A198A882A2B5801270492D32F0C0DADC6CAA81 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2592 | 4363463463464363463463463.exe | GET | 200 | 163.5.169.28:80 | http://163.5.169.28/fd1.exe | unknown | executable | 649 Kb | unknown |
2832 | 4363463463464363463463463.exe | GET | — | 175.119.10.231:80 | http://brusuax.com/dl/buildz.exe | unknown | — | — | unknown |
2248 | 4363463463464363463463463.exe | GET | 200 | 91.215.85.223:80 | http://marksidfgs.ug/ghjkl.exe | unknown | executable | 2.13 Mb | unknown |
796 | 4363463463464363463463463.exe | GET | 200 | 185.172.128.19:80 | http://185.172.128.19/new/Miner-XMR1.exe | unknown | executable | 6.42 Mb | unknown |
3988 | 4363463463464363463463463.exe | GET | 200 | 185.215.113.66:80 | http://185.215.113.66/pei.exe | unknown | executable | 9.50 Kb | unknown |
2832 | 4363463463464363463463463.exe | GET | — | 175.119.10.231:80 | http://brusuax.com/dl/buildz.exe | unknown | — | — | unknown |
2832 | 4363463463464363463463463.exe | GET | 200 | 185.215.113.66:80 | http://185.215.113.66/pinf.exe | unknown | executable | 9.50 Kb | unknown |
2980 | pei.exe | GET | 200 | 185.215.113.66:80 | http://twizt.net/newtpp.exe | unknown | executable | 79.5 Kb | unknown |
2088 | 4363463463464363463463463.exe | GET | 200 | 5.42.65.115:80 | http://5.42.65.115/batushka/inte.exe | unknown | executable | 213 Kb | unknown |
2928 | 4363463463464363463463463.exe | GET | 200 | 185.172.128.8:80 | http://185.172.128.8/sc.exe | unknown | executable | 282 Kb | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
3784 | 4363463463464363463463463.exe | 151.101.2.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
2124 | 4363463463464363463463463.exe | 151.101.2.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
2892 | 4363463463464363463463463.exe | 151.101.2.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
796 | 4363463463464363463463463.exe | 151.101.2.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
2832 | 4363463463464363463463463.exe | 151.101.2.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
2592 | 4363463463464363463463463.exe | 151.101.2.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
2592 | 4363463463464363463463463.exe | 163.5.169.28:80 | — | Bursabil Teknoloji A.S. | FR | unknown |
Domain | IP | Reputation |
|---|---|---|
urlhaus.abuse.ch |
| whitelisted |
github.com |
| shared |
brusuax.com |
| unknown |
raw.githubusercontent.com |
| shared |
marksidfgs.ug |
| unknown |
objects.githubusercontent.com |
| shared |
twizt.net |
| unknown |
bitbucket.org |
| shared |
carthagefire.net |
| malicious |
bbuseruploads.s3.amazonaws.com |
| shared |
PID | Process | Class | Message |
|---|---|---|---|
2592 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2592 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile |
2592 | 4363463463464363463463463.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2592 | 4363463463464363463463463.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2592 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
2592 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
796 | 4363463463464363463463463.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
796 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
796 | 4363463463464363463463463.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
796 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
Process | Message |
|---|---|
4363463463464363463463463.exe | The request was aborted: The connection was closed unexpectedly.
|
4363463463464363463463463.exe | The specified executable is not a valid application for this OS platform.
|
4363463463464363463463463.exe | The request was aborted: The connection was closed unexpectedly.
|
4363463463464363463463463.exe | The request was aborted: The connection was closed unexpectedly.
|
4363463463464363463463463.exe | The underlying connection was closed: The connection was closed unexpectedly.
|
4363463463464363463463463.exe | The request was aborted: The connection was closed unexpectedly.
|
4363463463464363463463463.exe | The request was aborted: Could not create SSL/TLS secure channel.
|
4363463463464363463463463.exe | The remote server returned an error: (404) Not Found.
|
4363463463464363463463463.exe | The specified executable is not a valid application for this OS platform.
|
4363463463464363463463463.exe | The specified executable is not a valid application for this OS platform.
|