| File name: | c8a08858411449d9df33993acf378eec801138760ccf743430a6fed73757d955 |
| Full analysis: | https://app.any.run/tasks/e66aded9-3dfc-4cd2-b29e-9af05d8db6a0 |
| Verdict: | Malicious activity |
| Threats: | AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions. |
| Analysis date: | March 24, 2025, 19:45:10 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
| MD5: | FFAF524B9E6E6F3C520B297B2D87ED0A |
| SHA1: | 8A855AB7FFC459D759228EEDE5D47EA044A580FB |
| SHA256: | C8A08858411449D9DF33993ACF378EEC801138760CCF743430A6FED73757D955 |
| SSDEEP: | 3072:xfWwUw7nNnymHIZOTFbHOxoMtzvUMfq3zs2UFX9Ud/ld9CfwSew6Nbb/vM5J2UVZ:xxHMjYFbVwq3zTOXY9C+w6zhglvToO |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (63.1) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (23.8) |
| .dll | | | Win32 Dynamic Link Library (generic) (5.6) |
| .exe | | | Win32 Executable (generic) (3.8) |
| .exe | | | Generic Win/DOS Executable (1.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:10:16 21:40:53+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 8 |
| CodeSize: | 43008 |
| InitializedDataSize: | 172032 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xc6ee |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 7.10.0.0 |
| ProductVersionNumber: | 7.10.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | - |
| CompanyName: | Alexander Roshal |
| FileDescription: | WinRAR |
| FileVersion: | 7.10.0.0 |
| InternalName: | WinRAR |
| LegalCopyright: | Copyright © Alexander Roshal 1993-2025 |
| LegalTrademarks: | - |
| OriginalFileName: | WinRAR |
| ProductName: | WinRAR |
| ProductVersion: | 7.10.0.0 |
| AssemblyVersion: | 7.10.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 7304 | "C:\Users\admin\Desktop\c8a08858411449d9df33993acf378eec801138760ccf743430a6fed73757d955.exe" | C:\Users\admin\Desktop\c8a08858411449d9df33993acf378eec801138760ccf743430a6fed73757d955.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR Exit code: 0 Version: 7.10.0.0 Modules
| |||||||||||||||
| 7472 | C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\tmpD860.tmp.bat"" | C:\Windows\SysWOW64\cmd.exe | — | c8a08858411449d9df33993acf378eec801138760ccf743430a6fed73757d955.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7480 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7524 | timeout 3 | C:\Windows\SysWOW64\timeout.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: timeout - pauses command processing Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7584 | "C:\Users\admin\AppData\Roaming\winDLL.exe" | C:\Users\admin\AppData\Roaming\winDLL.exe | cmd.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR Version: 7.10.0.0 Modules
AsyncRat(PID) Process(7584) winDLL.exe C2 (1)18.197.94.4 Ports (1)6606 Version0.5.8 BotnetDefault Options AutoRuntrue Mutex7o0VxWGMI2qI InstallFolder%AppData% BSoDfalse AntiVMfalse Certificates Cert1MIIE8jCCAtqgAwIBAgIQAJidv/q5VKsQu6wMTycK2zANBgkqhkiG9w0BAQ0FADAaMRgwFgYDVQQDDA9Bc3luY1JBVCBTZXJ2ZXIwIBcNMjUwMzIwMTgzNDQxWhgPOTk5OTEyMzEyMzU5NTlaMBoxGDAWBgNVBAMMD0FzeW5jUkFUIFNlcnZlcjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMegqwo0ITD5dNQMa53YsJlOPDa3JiQdJbpfhITGFpBnnrn8AJgpab2MkYLUtwV9JoiFT25UP2du... Server_SignaturemywLexVTsE1VpFVHxXvTkT+nBWqu0Z+VlnzLL5vqulR1gzei7+Kod18W0Mf2VTobb7LSHxulbpnxQz913oJlHsQiLxPNvX8fc6QrlZafpU2IqiIWCAzTIMsTqlw0bepXaJ9W+P1Oleh+JiSLMG5E1C4+A249hR1HNbPH51tiDrZCacRXCYcLzKDuK0e/zneba8gv8j7ftSkm/jBn/g5XvrpYpc6QVcHBGKq3+l2MMRnHizC9kIBEBcN3ahxdITAC5LdsyZCkl7f2Xexxl+p0uE1QWGHItVY8GNRVezkqRsbo... Keys AESdf2f0f89655823369a74e938100eb447cfd1e6cb2fd43abbfb835c6338804ee8 Saltbfeb1e56fbcd973bb219022430a57843003d5644d21e62b9d4f180e7e6c33941 | |||||||||||||||
| 7816 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (7304) c8a08858411449d9df33993acf378eec801138760ccf743430a6fed73757d955.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | winDLL |
Value: "C:\Users\admin\AppData\Roaming\winDLL.exe" | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7304 | c8a08858411449d9df33993acf378eec801138760ccf743430a6fed73757d955.exe | C:\Users\admin\AppData\Roaming\winDLL.exe | executable | |
MD5:FFAF524B9E6E6F3C520B297B2D87ED0A | SHA256:C8A08858411449D9DF33993ACF378EEC801138760CCF743430A6FED73757D955 | |||
| 7304 | c8a08858411449d9df33993acf378eec801138760ccf743430a6fed73757d955.exe | C:\Users\admin\AppData\Local\Temp\tmpD860.tmp.bat | text | |
MD5:BB05A792EF07310B8583122FB55E16D1 | SHA256:C032EB738DC2C2A9EAF802709170253892D0B449FD9B22A003F39F85BCCC60CD | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2104 | svchost.exe | GET | 200 | 23.48.23.24:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | POST | 500 | 20.83.72.98:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2104 | svchost.exe | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2104 | svchost.exe | 23.48.23.24:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
2104 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
7584 | winDLL.exe | 18.197.94.4:6606 | — | AMAZON-02 | DE | unknown |
4380 | slui.exe | 20.83.72.98:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
7816 | slui.exe | 20.83.72.98:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |