Summary | ZeroBOX

svchost.exe

AsyncRAT
Category Machine Started Completed
FILE s1_win7_x6401 March 11, 2021, 3:45 p.m. March 11, 2021, 3:47 p.m.
Size 622.8KB
Type PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 565ac5ba7e675a80cfc1822364c9a701
SHA256 d56122952faca73ce36ac9ae1af081bc56819a2b8ea9df7021e57fd4747cde20
CRC32 5BBD473F
ssdeep 6144:ZTkP5UqFlv+5P5BZwShA7KgdUbZ9wBD4lm63A3e3nJErVbtWLffxSh4A:ZDqkrZwShBHbPU4VMe3Ywb4h4A
Yara
  • PE_Header_Zero - PE File Signature Zero
  • Win_Backdoor_AsyncRAT_Zero - Win Backdoor AsyncRAT
  • IsPE32 - (no description)
  • IsNET_EXE - (no description)
  • IsWindowsGUI - (no description)
  • HasOverlay - Overlay Check
  • HasDigitalSignature - DigitalSignature Check

Name Response Post-Analysis Lookup
coroloboxorozor.com
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

url http://go2.microsoft.com/fwlink/?LinkId=131738
url http://beta.visualstudio.net/net/sdk/feedback.asp
description Code injection with CreateRemoteThread in a remote process rule inject_thread
description Hijack network configuration rule hijack_network
description Create a windows service rule create_service
description Communications over UDP network rule network_udp_sock
description Listen for incoming communication rule network_tcp_listen
description Communications over Toredo network rule network_toredo
description Communications smtp rule network_smtp_dotNet
description Communications over P2P network rule network_p2p_win
description Communications over HTTP rule network_http
description File downloader/dropper rule network_dropper
description Communications over FTP rule network_ftp
description Communications over RAW socket rule network_tcp_socket
description Communications use DNS rule network_dns
description Communication using dga rule network_dga
description Escalade priviledges rule escalate_priv
description Take screenshot rule screenshot
description Run a keylogger rule keylogger
description Steal credential rule cred_local
description Record Audio rule sniff_audio
description APC queue tasks migration rule migrate_apc
description Malware can spread east-west file rule spreading_file
description Malware can spread east-west using share drive rule spreading_share
description Create or check mutex rule win_mutex
description Affect system registries rule win_registry
description Affect system token rule win_token
description Affect private profile rule win_private_profile
description Affect private profile rule win_files_operation
description Match Winsock 2 API library declaration rule Str_Win32_Winsock2_Library
description Match Windows Inet API library declaration rule Str_Win32_Wininet_Library
description Match Windows Inet API call rule Str_Win32_Internet_API
description Match Windows Http API call rule Str_Win32_Http_API
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerCheck__RemoteAPI
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__ConsoleCtrl
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description (no description) rule Check_Dlls
description Checks if being debugged rule anti_dbg
description Anti-Sandbox checks for ThreatExpert rule antisb_threatExpert
description Bypass DEP rule disable_dep
description Affect hook table rule win_hook
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.36418866
FireEye Generic.mg.565ac5ba7e675a80
CAT-QuickHeal Trojan.Multi
McAfee GenericRXNU-IO!565AC5BA7E67
Cylance Unsafe
Sangfor Trojan.MSIL.BaseLoader.gen
K7AntiVirus Trojan-Downloader ( 005787f21 )
Alibaba TrojanDownloader:MSIL/BaseLoader.22257a15
K7GW Trojan-Downloader ( 005787f21 )
Cybereason malicious.a7e675
Arcabit Trojan.Generic.D22BB532
BitDefenderTheta Gen:NN.ZemsilF.34608.Mm2@aaeGwOgi
Cyren W32/Trojan.QSAF-1339
Symantec ML.Attribute.HighConfidence
APEX Malicious
Avast Win32:KeyloggerX-gen [Trj]
Kaspersky HEUR:Trojan-Downloader.MSIL.BaseLoader.gen
BitDefender Trojan.GenericKD.36418866
NANO-Antivirus Trojan.Win32.BaseLoader.inybff
Paloalto generic.ml
AegisLab Trojan.MSIL.BaseLoader.a!c
Ad-Aware Trojan.GenericKD.36418866
Emsisoft Trojan.GenericKD.36418866 (B)
F-Secure Trojan.TR/Dldr.Agent.aspig
DrWeb Trojan.DownLoader36.56649
VIPRE Trojan.Win32.Generic!BT
TrendMicro Backdoor.MSIL.BASELOADER.USMANC221
McAfee-GW-Edition GenericRXNU-IO!565AC5BA7E67
Sophos Mal/Generic-S
Ikarus Trojan-Downloader.MSIL.Agent
ESET-NOD32 a variant of MSIL/TrojanDownloader.Agent.HLZ
eGambit PE.Heur.InvalidSig
Avira TR/Dldr.Agent.aspig
Antiy-AVL Trojan[Downloader]/MSIL.Agent
Kingsoft Win32.Troj.Undef.(kcloud)
Gridinsoft Trojan.Win32.Downloader.sa
Microsoft Trojan:Win32/Ymacco.AAD5
ViRobot Trojan.Win32.Z.Agent.637728
ZoneAlarm HEUR:Trojan-Downloader.MSIL.BaseLoader.gen
GData Trojan.GenericKD.36418866
Cynet Malicious (score: 100)
AhnLab-V3 Malware/Win32.RL_Generic.C4350325
ALYac Trojan.GenericKD.36418866
MAX malware (ai score=89)
Malwarebytes Spyware.PasswordStealer
TrendMicro-HouseCall Backdoor.MSIL.BASELOADER.USMANC221
Yandex Trojan.DL.Agent!yCHPNaXpg6M
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.114136975.susgen