File name:

5865e0cd40a0ae90b7626ac54b8e5a0838301eaf452fe4688f2378d711f168cc

Full analysis: https://app.any.run/tasks/1059d11f-2895-46f8-9944-142207a94d89
Verdict: Malicious activity
Threats:

AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.

Analysis date: May 23, 2025, 19:04:13
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
asyncrat
rat
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

6728AB8FBB52279E5C60661B5F7298AB

SHA1:

A0255F5C7D87A3E2574755C098CDDE0735DCCBAD

SHA256:

5865E0CD40A0AE90B7626AC54B8E5A0838301EAF452FE4688F2378D711F168CC

SSDEEP:

1536:Dlqkk/65yNC3QxpzUOlK4aff4WQbWaHE8NZmi1sHParTonx:Dkkk/65yNC3Qx6tgbWaerHSax

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • ASYNCRAT has been detected (MUTEX)

      • 5865e0cd40a0ae90b7626ac54b8e5a0838301eaf452fe4688f2378d711f168cc.exe (PID: 7424)
    • ASYNCRAT has been detected (YARA)

      • 5865e0cd40a0ae90b7626ac54b8e5a0838301eaf452fe4688f2378d711f168cc.exe (PID: 7424)
  • SUSPICIOUS

    • Connects to unusual port

      • 5865e0cd40a0ae90b7626ac54b8e5a0838301eaf452fe4688f2378d711f168cc.exe (PID: 7424)
  • INFO

    • Checks supported languages

      • 5865e0cd40a0ae90b7626ac54b8e5a0838301eaf452fe4688f2378d711f168cc.exe (PID: 7424)
    • Reads the machine GUID from the registry

      • 5865e0cd40a0ae90b7626ac54b8e5a0838301eaf452fe4688f2378d711f168cc.exe (PID: 7424)
    • Reads the computer name

      • 5865e0cd40a0ae90b7626ac54b8e5a0838301eaf452fe4688f2378d711f168cc.exe (PID: 7424)
    • Reads the software policy settings

      • slui.exe (PID: 7868)
    • Checks proxy server information

      • slui.exe (PID: 7868)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

AsyncRat

(PID) Process(7424) 5865e0cd40a0ae90b7626ac54b8e5a0838301eaf452fe4688f2378d711f168cc.exe
C2 (13)127.0.0.1
chromedata.accesscam.org
chromedata.webredirect.org
babuinocdt2025.ddns.net
babuinocdt2025.duckdns.org
ondamalucacdt.ddns.net
ondamalucacdt..duckdns.org
cdtmaestrodabahia.duckdns.org
all.ddnskey.com
skynetx2025.ddns.net
bundaleleba2025.accesscam.org
bundaleleba2025.ddns.net
skynetx2025.accesscam.org
Ports (13)6606
7707
2022
2019
2018
2012
5155
5556
2020
5555
5000
6666
2000
Version| Edit by Vinom Rat
Options
AutoRunfalse
MutexAsyncMutex_6SI8OkPnk
InstallFolder%AppData%
Certificates
Cert1MIIE8jCCAtqgAwIBAgIQAPeWQ4YJ3MvReCGwLzn7rTANBgkqhkiG9w0BAQ0FADAaMRgwFgYDVQQDDA9Bc3luY1JBVCBTZXJ2ZXIwIBcNMjIwNDI1MDA0MTA5WhgPOTk5OTEyMzEyMzU5NTlaMBoxGDAWBgNVBAMMD0FzeW5jUkFUIFNlcnZlcjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKT9nYYTjYTZhY+g1tekZ8/F29gsEIDgf/8odvCbCmYKGGZZi2yND9NjtBXEMANM9PAXCyMapGva...
Server_Signatureh+VUnPAhL0j1bqf0IpjGYlXLKwFmqusuXYCKT6HxEb5zjAGRlkR4Z26vBN0aNS4dlZrRClIXjdCswvwfP5BKxmqGEnWyv4/V0/tJQlXaywJ2kSIIEip18IxutlaMmrUMw65hJgUur3hVOC5PU2zIubzi+JDVfbl24JeUPKgTMaac2IR2r/oap/y26idHbatVwpV6OIA2mjdWL7sQCa9L6XhWtLD6ph6piAjgsmidjrROIhi8stxC2iaRNDv4vC4Qbxt5xiFUGHB8C0wLVa355cCPfH21CDxsXv+eEZFXJ3Qu...
Keys
AES8684258abd49dbc25a4bcb7fa5443cb59d7b06dd7eadecd4df9d4ab2167277eb
Saltbfeb1e56fbcd973bb219022430a57843003d5644d21e62b9d4f180e7e6c33941
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:07:06 17:14:47+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 65536
InitializedDataSize: 2560
UninitializedDataSize: -
EntryPoint: 0x11e5e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: -
FileVersion: 1.0.0.0
InternalName: Stub.exe
LegalCopyright: -
LegalTrademarks: -
OriginalFileName: Stub.exe
ProductName: -
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
127
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #ASYNCRAT 5865e0cd40a0ae90b7626ac54b8e5a0838301eaf452fe4688f2378d711f168cc.exe svchost.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
7424"C:\Users\admin\Desktop\5865e0cd40a0ae90b7626ac54b8e5a0838301eaf452fe4688f2378d711f168cc.exe" C:\Users\admin\Desktop\5865e0cd40a0ae90b7626ac54b8e5a0838301eaf452fe4688f2378d711f168cc.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\5865e0cd40a0ae90b7626ac54b8e5a0838301eaf452fe4688f2378d711f168cc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
AsyncRat
(PID) Process(7424) 5865e0cd40a0ae90b7626ac54b8e5a0838301eaf452fe4688f2378d711f168cc.exe
C2 (13)127.0.0.1
chromedata.accesscam.org
chromedata.webredirect.org
babuinocdt2025.ddns.net
babuinocdt2025.duckdns.org
ondamalucacdt.ddns.net
ondamalucacdt..duckdns.org
cdtmaestrodabahia.duckdns.org
all.ddnskey.com
skynetx2025.ddns.net
bundaleleba2025.accesscam.org
bundaleleba2025.ddns.net
skynetx2025.accesscam.org
Ports (13)6606
7707
2022
2019
2018
2012
5155
5556
2020
5555
5000
6666
2000
Version| Edit by Vinom Rat
Options
AutoRunfalse
MutexAsyncMutex_6SI8OkPnk
InstallFolder%AppData%
Certificates
Cert1MIIE8jCCAtqgAwIBAgIQAPeWQ4YJ3MvReCGwLzn7rTANBgkqhkiG9w0BAQ0FADAaMRgwFgYDVQQDDA9Bc3luY1JBVCBTZXJ2ZXIwIBcNMjIwNDI1MDA0MTA5WhgPOTk5OTEyMzEyMzU5NTlaMBoxGDAWBgNVBAMMD0FzeW5jUkFUIFNlcnZlcjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKT9nYYTjYTZhY+g1tekZ8/F29gsEIDgf/8odvCbCmYKGGZZi2yND9NjtBXEMANM9PAXCyMapGva...
Server_Signatureh+VUnPAhL0j1bqf0IpjGYlXLKwFmqusuXYCKT6HxEb5zjAGRlkR4Z26vBN0aNS4dlZrRClIXjdCswvwfP5BKxmqGEnWyv4/V0/tJQlXaywJ2kSIIEip18IxutlaMmrUMw65hJgUur3hVOC5PU2zIubzi+JDVfbl24JeUPKgTMaac2IR2r/oap/y26idHbatVwpV6OIA2mjdWL7sQCa9L6XhWtLD6ph6piAjgsmidjrROIhi8stxC2iaRNDv4vC4Qbxt5xiFUGHB8C0wLVa355cCPfH21CDxsXv+eEZFXJ3Qu...
Keys
AES8684258abd49dbc25a4bcb7fa5443cb59d7b06dd7eadecd4df9d4ab2167277eb
Saltbfeb1e56fbcd973bb219022430a57843003d5644d21e62b9d4f180e7e6c33941
7868C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
3 784
Read events
3 784
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
23
DNS requests
32
Threats
30

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
whitelisted
2104
svchost.exe
GET
200
23.48.23.166:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6480
RUXIMICS.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2104
svchost.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6480
RUXIMICS.exe
GET
200
23.48.23.166:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6480
RUXIMICS.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
23.48.23.166:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6480
RUXIMICS.exe
23.48.23.166:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2104
svchost.exe
2.19.217.218:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
6480
RUXIMICS.exe
2.19.217.218:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.174
whitelisted
crl.microsoft.com
  • 23.48.23.166
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 2.19.217.218
whitelisted
chromedata.accesscam.org
malicious
all.ddnskey.com
  • 34.198.182.201
malicious
bundaleleba2025.accesscam.org
unknown
babuinocdt2025.ddns.net
malicious
skynetx2025.accesscam.org
unknown
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Potentially Bad Traffic
ET DYN_DNS DYNAMIC_DNS Query to a *.accesscam .org Domain
2196
svchost.exe
Potentially Bad Traffic
ET DYN_DNS DYNAMIC_DNS Query to a *.accesscam .org Domain
2196
svchost.exe
Potentially Bad Traffic
ET DYN_DNS DYNAMIC_DNS Query to a *.accesscam .org Domain
2196
svchost.exe
Potentially Bad Traffic
ET DYN_DNS DNS Query to DynDNS Domain *.ddns .net
2196
svchost.exe
Potentially Bad Traffic
ET DYN_DNS DYNAMIC_DNS Query to a *.accesscam .org Domain
2196
svchost.exe
Potentially Bad Traffic
ET DYN_DNS DNS Query to DynDNS Domain *.ddns .net
2196
svchost.exe
Potentially Bad Traffic
ET DYN_DNS DNS Query to DynDNS Domain *.ddns .net
2196
svchost.exe
Potentially Bad Traffic
ET DYN_DNS DNS Query to DynDNS Domain *.ddns .net
2196
svchost.exe
Potentially Bad Traffic
ET DYN_DNS DYNAMIC_DNS Query to a *.accesscam .org Domain
2196
svchost.exe
Potentially Bad Traffic
ET DYN_DNS DYNAMIC_DNS Query to a *.duckdns .org Domain
No debug info