File name:

RAD-7458-JVURJ-7455-GRVRD-0415-2025.exe

Full analysis: https://app.any.run/tasks/94f270a4-9b1e-4318-9256-08b40391d5eb
Verdict: Malicious activity
Threats:

AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.

Analysis date: May 14, 2025, 21:16:19
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto
generic
rat
asyncrat
remote
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 7 sections
MD5:

ADCD695A86AD62ADF15A01E364145FD5

SHA1:

8A07D75BA93DE000F047825C5281E33B6652C17F

SHA256:

FBFAA29E332EE5E89DEA7F8EAADD6E271975C21D2D1AA41C9C9A8E533B6F2798

SSDEEP:

98304:G/9ADTpciOBuYuBnzGcxbgwQLpq8ly5SGkPKnzI8E9P8YyXrQtUX8HYTWG+JN1a2:mmr5tm

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GENERIC has been found (auto)

      • RAD-7458-JVURJ-7455-GRVRD-0415-2025.exe (PID: 1276)
      • C-Distributed.exe (PID: 4756)
    • Executing a file with an untrusted certificate

      • FrameCondu.exe (PID: 7532)
      • XPFix.exe (PID: 7748)
    • ASYNCRAT has been detected (SURICATA)

      • FrameCondu.exe (PID: 7532)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • RAD-7458-JVURJ-7455-GRVRD-0415-2025.exe (PID: 5304)
      • C-Distributed.exe (PID: 4756)
      • RAD-7458-JVURJ-7455-GRVRD-0415-2025.exe (PID: 1276)
      • C-Distributed.exe (PID: 4000)
    • Starts itself from another location

      • RAD-7458-JVURJ-7455-GRVRD-0415-2025.exe (PID: 5304)
      • C-Distributed.exe (PID: 4756)
    • The process drops C-runtime libraries

      • RAD-7458-JVURJ-7455-GRVRD-0415-2025.exe (PID: 1276)
      • C-Distributed.exe (PID: 4756)
    • Process drops legitimate windows executable

      • C-Distributed.exe (PID: 4756)
      • RAD-7458-JVURJ-7455-GRVRD-0415-2025.exe (PID: 1276)
    • Contacting a server suspected of hosting an CnC

      • FrameCondu.exe (PID: 7532)
    • Connects to unusual port

      • FrameCondu.exe (PID: 7532)
  • INFO

    • Checks supported languages

      • RAD-7458-JVURJ-7455-GRVRD-0415-2025.exe (PID: 5304)
      • RAD-7458-JVURJ-7455-GRVRD-0415-2025.exe (PID: 1276)
      • C-Distributed.exe (PID: 4756)
      • FrameCondu.exe (PID: 7532)
      • C-Distributed.exe (PID: 4000)
      • XPFix.exe (PID: 7748)
    • The sample compiled with english language support

      • RAD-7458-JVURJ-7455-GRVRD-0415-2025.exe (PID: 1276)
      • RAD-7458-JVURJ-7455-GRVRD-0415-2025.exe (PID: 5304)
      • C-Distributed.exe (PID: 4756)
    • Create files in a temporary directory

      • RAD-7458-JVURJ-7455-GRVRD-0415-2025.exe (PID: 5304)
      • RAD-7458-JVURJ-7455-GRVRD-0415-2025.exe (PID: 1276)
      • C-Distributed.exe (PID: 4000)
      • XPFix.exe (PID: 7748)
    • Reads the computer name

      • C-Distributed.exe (PID: 4756)
      • C-Distributed.exe (PID: 4000)
      • XPFix.exe (PID: 7748)
      • FrameCondu.exe (PID: 7532)
    • Creates files in the program directory

      • C-Distributed.exe (PID: 4756)
    • Creates files or folders in the user directory

      • C-Distributed.exe (PID: 4000)
    • The sample compiled with chinese language support

      • C-Distributed.exe (PID: 4000)
    • Reads the software policy settings

      • FrameCondu.exe (PID: 7532)
    • Reads the machine GUID from the registry

      • FrameCondu.exe (PID: 7532)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:04:05 13:00:43+00:00
ImageFileCharacteristics: Executable, 32-bit, Removable run from swap, Net run from swap
PEType: PE32
LinkerVersion: 14.34
CodeSize: 442880
InitializedDataSize: 237568
UninitializedDataSize: -
EntryPoint: 0x46a50
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 4.6.2.0
ProductVersionNumber: 4.6.2.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: ASCII
CompanyName: Article
FileDescription: Amanita
FileVersion: 4.6.2.0
InternalName: burn
OriginalFileName: indamine.exe
ProductName: Amanita
ProductVersion: 4.6.2.0
LegalCopyright: Copyright (c) Article. All rights reserved.
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
9
Malicious processes
5
Suspicious processes
1

Behavior graph

Click at the process to see the details
start rad-7458-jvurj-7455-grvrd-0415-2025.exe #GENERIC rad-7458-jvurj-7455-grvrd-0415-2025.exe #GENERIC c-distributed.exe c-distributed.exe sppextcomobj.exe no specs slui.exe no specs #ASYNCRAT framecondu.exe xpfix.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
1276"C:\Users\admin\AppData\Local\Temp\{BC49FA82-802C-4091-BD8C-7E124CEDF7DD}\.cr\RAD-7458-JVURJ-7455-GRVRD-0415-2025.exe" -burn.clean.room="C:\Users\admin\AppData\Local\Temp\RAD-7458-JVURJ-7455-GRVRD-0415-2025.exe" -burn.filehandle.attached=760 -burn.filehandle.self=764C:\Users\admin\AppData\Local\Temp\{BC49FA82-802C-4091-BD8C-7E124CEDF7DD}\.cr\RAD-7458-JVURJ-7455-GRVRD-0415-2025.exe
RAD-7458-JVURJ-7455-GRVRD-0415-2025.exe
User:
admin
Company:
Article
Integrity Level:
MEDIUM
Description:
Amanita
Exit code:
0
Version:
4.6.2.0
Modules
Images
c:\users\admin\appdata\local\temp\{bc49fa82-802c-4091-bd8c-7e124cedf7dd}\.cr\rad-7458-jvurj-7455-grvrd-0415-2025.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
4000C:\ProgramData\biDaemon_2\C-Distributed.exeC:\ProgramData\biDaemon_2\C-Distributed.exe
C-Distributed.exe
User:
admin
Company:
AOMEI International Network Limited
Integrity Level:
MEDIUM
Description:
Splash Window
Exit code:
0
Version:
4.0.0.0
Modules
Images
c:\programdata\bidaemon_2\c-distributed.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
4756C:\Users\admin\AppData\Local\Temp\{DC44AF78-4C59-4AE7-AE8A-0D41EDCACA5B}\.ba\C-Distributed.exeC:\Users\admin\AppData\Local\Temp\{DC44AF78-4C59-4AE7-AE8A-0D41EDCACA5B}\.ba\C-Distributed.exe
RAD-7458-JVURJ-7455-GRVRD-0415-2025.exe
User:
admin
Company:
AOMEI International Network Limited
Integrity Level:
MEDIUM
Description:
Splash Window
Exit code:
0
Version:
4.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\{dc44af78-4c59-4ae7-ae8a-0d41edcaca5b}\.ba\c-distributed.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
5304"C:\Users\admin\AppData\Local\Temp\RAD-7458-JVURJ-7455-GRVRD-0415-2025.exe" C:\Users\admin\AppData\Local\Temp\RAD-7458-JVURJ-7455-GRVRD-0415-2025.exe
explorer.exe
User:
admin
Company:
Article
Integrity Level:
MEDIUM
Description:
Amanita
Exit code:
0
Version:
4.6.2.0
Modules
Images
c:\users\admin\appdata\local\temp\rad-7458-jvurj-7455-grvrd-0415-2025.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7200C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7232"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7532C:\Users\admin\FrameCondu.exeC:\Users\admin\FrameCondu.exe
C-Distributed.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\ecfe2b2.tmp
c:\users\admin\framecondu.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
7748"C:\Users\admin\AppData\Roaming\biDaemon_2\XPFix.exe" "C:\Users\admin\AppData\Roaming\biDaemon_2\XPFix.exe" /updateC:\Users\admin\AppData\Roaming\biDaemon_2\XPFix.exeC-Distributed.exe
User:
admin
Company:
360.cn
Integrity Level:
MEDIUM
Description:
360安全卫士 安全防护中心模块
Exit code:
0
Version:
1, 0, 0, 1013
Modules
Images
c:\windows\syswow64\input.dll
c:\users\admin\appdata\roaming\bidaemon_2\xpfix.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
4 092
Read events
4 092
Write events
0
Delete events
0

Modification events

No data
Executable files
12
Suspicious files
7
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
4756C-Distributed.exeC:\ProgramData\biDaemon_2\C-Distributed.exeexecutable
MD5:4D20B83562EEC3660E45027AD56FB444
SHA256:C5E650B331FA5292872FDAEDE3A75C8167A0F1280CE0CD3D58B880D23854BDB1
4756C-Distributed.exeC:\ProgramData\biDaemon_2\DuiLib_u.dllexecutable
MD5:5F7903FFD30D5EA8F572CF8C687C4310
SHA256:D01466854E4D5B0FADB2F129B1CD11FECC767505902F4E30D694E05F263EF7B9
1276RAD-7458-JVURJ-7455-GRVRD-0415-2025.exeC:\Users\admin\AppData\Local\Temp\{DC44AF78-4C59-4AE7-AE8A-0D41EDCACA5B}\.ba\BootstrapperApplicationData.xmlxml
MD5:3EE13C47FB137F5F210E00414DE16139
SHA256:6BB75AF00F9B901A27F9474E7466D72810A93684AD0292F74898C9790A864DD7
4000C-Distributed.exeC:\Users\admin\AppData\Local\Temp\ECFE2B2.tmp
MD5:
SHA256:
1276RAD-7458-JVURJ-7455-GRVRD-0415-2025.exeC:\Users\admin\AppData\Local\Temp\{DC44AF78-4C59-4AE7-AE8A-0D41EDCACA5B}\.ba\msvcp140.dllexecutable
MD5:E9F00DD8746712610706CBEFFD8DF0BD
SHA256:4CB882621A3D1C6283570447F842801B396DB1B3DCD2E01C2F7002EFD66A0A97
5304RAD-7458-JVURJ-7455-GRVRD-0415-2025.exeC:\Users\admin\AppData\Local\Temp\{BC49FA82-802C-4091-BD8C-7E124CEDF7DD}\.cr\RAD-7458-JVURJ-7455-GRVRD-0415-2025.exeexecutable
MD5:167B570F09A76087FEFFD59D6C1867BF
SHA256:8AA6E6FD67D238F86DED98520DF9F9330F48B9D90DD1B6745D1EE453E5D31849
1276RAD-7458-JVURJ-7455-GRVRD-0415-2025.exeC:\Users\admin\AppData\Local\Temp\{DC44AF78-4C59-4AE7-AE8A-0D41EDCACA5B}\.ba\vcruntime140.dllexecutable
MD5:A554E4F1ADDC0C2C4EBB93D66B790796
SHA256:E610CDAC0A37147919032D0D723B967276C217FF06EA402F098696AB4112512A
4756C-Distributed.exeC:\ProgramData\biDaemon_2\vcruntime140.dllexecutable
MD5:A554E4F1ADDC0C2C4EBB93D66B790796
SHA256:E610CDAC0A37147919032D0D723B967276C217FF06EA402F098696AB4112512A
4756C-Distributed.exeC:\ProgramData\biDaemon_2\Deng.jbbinary
MD5:F41D41097F01D1ED5CF992532CC09900
SHA256:CEAB50227387AF315A4DAD9F76D01D13378DFCA5CE38B3AF85BC699D95B76533
4000C-Distributed.exeC:\Users\admin\AppData\Roaming\biDaemon_2\XPFix.exeexecutable
MD5:810D42177538AD5CA18D4DD597C00658
SHA256:5EC174AF8A18A5516B8A6E11D8A27481D70DF14D1EDB67C48B5458FF44DF9146
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
22
DNS requests
15
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
104.124.11.17:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
DE
binary
825 b
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
CL
binary
868 b
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
DE
binary
471 b
whitelisted
7628
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
NL
binary
407 b
whitelisted
7628
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
NL
binary
419 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
104.124.11.17:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.219.150.101:80
www.microsoft.com
AKAMAI-AS
CL
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.65:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:137
whitelisted
7628
SIHClient.exe
52.149.20.212:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.174
whitelisted
crl.microsoft.com
  • 104.124.11.17
  • 104.124.11.58
whitelisted
www.microsoft.com
  • 23.219.150.101
  • 95.101.149.131
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.160.65
  • 40.126.32.136
  • 20.190.160.3
  • 20.190.160.67
  • 40.126.32.138
  • 20.190.160.128
  • 40.126.32.74
  • 20.190.160.22
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
  • 4.231.128.59
whitelisted
lindo1.dynuddns.com
  • 176.65.141.141
malicious

Threats

PID
Process
Class
Message
2196
svchost.exe
Potentially Bad Traffic
ET DYN_DNS DYNAMIC_DNS Query to a *.dynuddns .com Domain
7532
FrameCondu.exe
Domain Observed Used for C2 Detected
REMOTE [ANY.RUN] AsyncRAT SSL certificate
7532
FrameCondu.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Malicious SSL Cert (AsyncRAT)
7532
FrameCondu.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] AsyncRAT Successful Connection
No debug info