General

  • Target

    Documento_99807_40806_2022_consulta_procesos_ramajudicial_fallo.exe

  • Size

    207KB

  • Sample

    220120-zx7lqsbfdr

  • MD5

    d8cbee400f429451d895c0fa516fbec2

  • SHA1

    e55216848d4b41e0f34b8411d63353e7dee8a999

  • SHA256

    964206c347c4b90e09c56fe2b42792eef1115caae55e6216a533bd8a3f3a5d56

  • SHA512

    6e51c319ec5671effb87276f58b5a02a52e8959c38b300f94db9c8b342d4bc86fe0b9f3c806ab1770fdcae91710236a05719f44e4bfdb57993525afafb8d0975

Score
10/10

Malware Config

Targets

    • Target

      Documento_99807_40806_2022_consulta_procesos_ramajudicial_fallo.exe

    • Size

      207KB

    • MD5

      d8cbee400f429451d895c0fa516fbec2

    • SHA1

      e55216848d4b41e0f34b8411d63353e7dee8a999

    • SHA256

      964206c347c4b90e09c56fe2b42792eef1115caae55e6216a533bd8a3f3a5d56

    • SHA512

      6e51c319ec5671effb87276f58b5a02a52e8959c38b300f94db9c8b342d4bc86fe0b9f3c806ab1770fdcae91710236a05719f44e4bfdb57993525afafb8d0975

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

      suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

    • Async RAT payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks