File name:

463015a3b9ebb0705043bbbb5e48face389d5043ea49863b6e1820eefcb47c6b.ps1

Full analysis: https://app.any.run/tasks/99d007b4-b2ec-489d-84a7-199c52740a7b
Verdict: Malicious activity
Threats:

AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.

Analysis date: April 20, 2025, 05:40:28
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
rat
asyncrat
remote
Indicators:
MIME: text/plain
File info: ASCII text, with CRLF line terminators
MD5:

F63FA802558C4B210D52626E4F3E7391

SHA1:

4A67B1BF004C547C38051A2DDB8C493541AD41E7

SHA256:

463015A3B9EBB0705043BBBB5E48FACE389D5043EA49863B6E1820EEFCB47C6B

SSDEEP:

24:VoCv8i591oiyaApfXpb9x2xq9L2hAz8gcTy:qCvB5voiyaCfXpb98I9yhGmTy

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Bypass execution policy to execute commands

      • powershell.exe (PID: 2432)
    • Dynamically loads an assembly (POWERSHELL)

      • powershell.exe (PID: 2432)
    • Downloads the requested resource (POWERSHELL)

      • powershell.exe (PID: 2432)
    • ASYNCRAT has been detected (SURICATA)

      • MSBuild.exe (PID: 4988)
    • ASYNCRAT has been detected (YARA)

      • MSBuild.exe (PID: 4988)
  • SUSPICIOUS

    • Potential Corporate Privacy Violation

      • powershell.exe (PID: 2432)
    • CSC.EXE is used to compile C# code

      • csc.exe (PID: 6708)
    • Process requests binary or script from the Internet

      • powershell.exe (PID: 2432)
    • Connects to the server without a host name

      • powershell.exe (PID: 2432)
    • Executable content was dropped or overwritten

      • csc.exe (PID: 6708)
    • Contacting a server suspected of hosting an CnC

      • MSBuild.exe (PID: 4988)
    • Connects to unusual port

      • MSBuild.exe (PID: 4988)
  • INFO

    • Disables trace logs

      • powershell.exe (PID: 2432)
    • Checks proxy server information

      • powershell.exe (PID: 2432)
    • Checks supported languages

      • csc.exe (PID: 6708)
      • cvtres.exe (PID: 6264)
      • MSBuild.exe (PID: 4988)
    • Reads the machine GUID from the registry

      • csc.exe (PID: 6708)
      • MSBuild.exe (PID: 4988)
    • Create files in a temporary directory

      • csc.exe (PID: 6708)
      • cvtres.exe (PID: 6264)
    • Reads the computer name

      • MSBuild.exe (PID: 4988)
    • Reads the software policy settings

      • MSBuild.exe (PID: 4988)
      • slui.exe (PID: 4652)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

AsyncRat

(PID) Process(4988) MSBuild.exe
C2 (1)185.39.17.70
Ports (1)8848
VersionLoaderPanel
Options
AutoRunfalse
Mutexhqjitjybornneksp
InstallFolder%AppData%
Certificates
Cert1MIICMDCCAZmgAwIBAgIVAJHz+ah5/J2brULSjvSUc0iQ1oaHMA0GCSqGSIb3DQEBDQUAMGQxFTATBgNVBAMMDExvYWRlciBQYW5lbDETMBEGA1UECwwKcXdxZGFuY2h1bjEcMBoGA1UECgwTRGNSYXQgQnkgcXdxZGFuY2h1bjELMAkGA1UEBwwCU0gxCzAJBgNVBAYTAkNOMB4XDTI0MDYyMzE5MDc1MFoXDTM1MDQwMjE5MDc1MFowEDEOMAwGA1UEAwwFRGNSYXQwgZ8wDQYJKoZIhvcNAQEBBQADgY0A...
Server_SignatureCVPJD93DL+2331qWjErlHyBf0bqnxvWR24DG8xoU2w8Fu23X270YtV59LTJ0N8Plv03LW3PY7akBWoRGmuVkQTXZTjcv1TQLGqEQKNF2nCgwXlAhcijHNy225rmayMaXZEEvzoQ67S1C0GVIrsA+nAluqxnqZDCYb05xbPj+Kbo=
Keys
AES481c4247d86c050707a1e70b4783bb0238af9974ab55e0f85bd5e3b01f893f00
SaltLoaderPanel
No Malware configuration.
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
8
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start powershell.exe conhost.exe no specs sppextcomobj.exe no specs slui.exe csc.exe cvtres.exe no specs #ASYNCRAT msbuild.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2432"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass C:\Users\admin\AppData\Local\Temp\463015a3b9ebb0705043bbbb5e48face389d5043ea49863b6e1820eefcb47c6b.ps1C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3020C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
4652"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4988"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
MSBuild.exe
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\msbuild.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
AsyncRat
(PID) Process(4988) MSBuild.exe
C2 (1)185.39.17.70
Ports (1)8848
VersionLoaderPanel
Options
AutoRunfalse
Mutexhqjitjybornneksp
InstallFolder%AppData%
Certificates
Cert1MIICMDCCAZmgAwIBAgIVAJHz+ah5/J2brULSjvSUc0iQ1oaHMA0GCSqGSIb3DQEBDQUAMGQxFTATBgNVBAMMDExvYWRlciBQYW5lbDETMBEGA1UECwwKcXdxZGFuY2h1bjEcMBoGA1UECgwTRGNSYXQgQnkgcXdxZGFuY2h1bjELMAkGA1UEBwwCU0gxCzAJBgNVBAYTAkNOMB4XDTI0MDYyMzE5MDc1MFoXDTM1MDQwMjE5MDc1MFowEDEOMAwGA1UEAwwFRGNSYXQwgZ8wDQYJKoZIhvcNAQEBBQADgY0A...
Server_SignatureCVPJD93DL+2331qWjErlHyBf0bqnxvWR24DG8xoU2w8Fu23X270YtV59LTJ0N8Plv03LW3PY7akBWoRGmuVkQTXZTjcv1TQLGqEQKNF2nCgwXlAhcijHNy225rmayMaXZEEvzoQ67S1C0GVIrsA+nAluqxnqZDCYb05xbPj+Kbo=
Keys
AES481c4247d86c050707a1e70b4783bb0238af9974ab55e0f85bd5e3b01f893f00
SaltLoaderPanel
6032\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6248C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6264C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESC797.tmp" "c:\Users\admin\AppData\Local\Temp\CSC3EDDCEA29454527A6AD93ADCF34A583.TMP"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
14.32.31326.0
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\vcruntime140_1_clr0400.dll
6708"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\flex5bzh.cmdline"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ole32.dll
Total events
9 016
Read events
9 016
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
6
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
2432powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_af3lk4fb.edc.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
2432powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF10b3d1.TMPbinary
MD5:D040F64E9E7A2BB91ABCA5613424598E
SHA256:D04E0A6940609BD6F3B561B0F6027F5CA4E8C5CF0FB0D0874B380A0374A8D670
2432powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_rv2qcgw0.gvc.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
2432powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\POHA6GO2GT4Y83C9Y68J.tempbinary
MD5:EF59C502AB17D1482971D73C919A15B6
SHA256:3BC249C09A71328F73E4C026FE3E33018DA4D061E990F24544AC931294E8DC58
2432powershell.exeC:\Users\admin\AppData\Local\Temp\flex5bzh.cmdlinetext
MD5:66D8CBF1E02C6F3D98774E2687291FC0
SHA256:BE89DE3175527E5AD0632C85BD1B526E3DF9E95CDC9FF7F252ABF86CA99EEB4A
6708csc.exeC:\Users\admin\AppData\Local\Temp\CSC3EDDCEA29454527A6AD93ADCF34A583.TMPbinary
MD5:970E2F1A50BE0C9E39648809545AF911
SHA256:A6EAC3FC5AD2B9B91D5676681748173627C5B0658835B12E4E00474F619414CF
2432powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msbinary
MD5:EF59C502AB17D1482971D73C919A15B6
SHA256:3BC249C09A71328F73E4C026FE3E33018DA4D061E990F24544AC931294E8DC58
2432powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:698D5874EB9EAF6436483CE8A3319029
SHA256:0EE762A560D6D2FC3C8739E5A1966D11A4A629EE6F889DFFEFF966F6CACA23D4
6708csc.exeC:\Users\admin\AppData\Local\Temp\flex5bzh.dllexecutable
MD5:A1D62A45497FC2D2831B0D2C5D2CD2FC
SHA256:984C81AF2F0D40C48866A6D492BC2FBFE02DBD7866C90A69571817A6F93EB14E
2432powershell.exeC:\Users\admin\AppData\Local\Temp\flex5bzh.0.cstext
MD5:58B10EF6BA0DA88788F1AAC56CE7E2DB
SHA256:AE11144F426028E50E77D64A66AEB954E169F627F8ABFE403791032594834520
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
20
DNS requests
14
Threats
10

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.164.72:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2432
powershell.exe
GET
200
185.39.17.70:80
http://185.39.17.70/zgrnf/qxm.exe
unknown
unknown
2432
powershell.exe
GET
200
185.39.17.70:80
http://185.39.17.70/zgrnf/pixel.exe
unknown
unknown
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6800
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6800
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.164.72:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
2432
powershell.exe
185.39.17.70:80
Joint Stock Company Tagnet
RU
unknown
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.131:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4988
MSBuild.exe
185.39.17.70:8848
Joint Stock Company Tagnet
RU
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 2.16.164.72
  • 2.16.164.49
whitelisted
google.com
  • 142.250.184.206
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.160.131
  • 20.190.160.67
  • 20.190.160.132
  • 40.126.32.76
  • 40.126.32.74
  • 20.190.160.130
  • 40.126.32.134
  • 40.126.32.138
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted

Threats

PID
Process
Class
Message
2432
powershell.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
2432
powershell.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
2432
powershell.exe
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
2432
powershell.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
2432
powershell.exe
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
2432
powershell.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
2432
powershell.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
2432
powershell.exe
Potentially Bad Traffic
ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
4988
MSBuild.exe
Domain Observed Used for C2 Detected
REMOTE [ANY.RUN] AsyncRAT SSL certificate
4988
MSBuild.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] AsyncRAT Successful Connection
No debug info