Task Information
| Task ID: | d92397f6-076e-11f1-82f6-42010aa4000b |
| File name: | 9e886363f5e92f4a1cdbe6bfb4bf10cf |
| Task parameters: | ClamAV scan: | True |
| Unpack: | False |
| Share file: | True |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | AcRat
|
| Author: | Nikos 'n0t' Totosis |
| Description: | AcRat Payload (based on AsyncRat) |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | classified |
| Description: | classified |
| Rule name: | dcrat
|
| Author: | jeFF0Falltrades |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | dcrat_rkp
|
| Author: | jeFF0Falltrades |
| Description: | Detects DCRat payloads |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | MAL_AsnycRAT
|
| Author: | SECUINFRA Falcon Team |
| Description: | Detects AsnycRAT based on it's config decryption routine |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
| Rule name: | MAL_AsyncRAT_Config_Decryption
|
| Author: | SECUINFRA Falcon Team |
| Description: | Detects AsnycRAT based on it's config decryption routine |
| TLP: | TLP:WHITE |
| Rule name: | Multifamily_RAT_Detection
|
| Author: | Lucas Acha (http://www.lukeacha.com) |
| Description: | Generic Detection for multiple RAT families, PUPs, Packers and suspicious executables |
| TLP: | TLP:WHITE |
| Repository: | |
| Rule name: | NET
|
| Author: | malware-lu |
| TLP: | TLP:WHITE |
| Repository: | |
| Rule name: | Njrat
|
| Author: | botherder https://github.com/botherder |
| Description: | Njrat |
| TLP: | TLP:WHITE |
| Repository: | |
| Rule name: | Sus_CMD_Powershell_Usage
|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | SUSP_DOTNET_PE_List_AV
|
| Author: | SECUINFRA Falcon Team |
| Description: | Detecs .NET Binary that lists installed AVs |
| TLP: | TLP:WHITE |
| Rule name: | win_asyncrat_unobfuscated
|
| Author: | Matthew @ Embee_Research |
| Description: | Detects strings present in unobfuscated AsyncRat Samples. Rule may also pick up on other Asyncrat-derived malware (Dcrat/venom etc) |
| TLP: | TLP:WHITE |
| Repository: | YARAify |
| Rule name: | classified |
| Author: | classified |
| Description: | classified |
| TLP : | TLP:AMBER |
Unpacker
The following YARA rules matched on the unpacked file.
Disabled by submitter
Unpacked Files
The following files could be unpacked from this sample.
Disabled by submitter