General
-
Target
#3 NOTIFICACION DEMANDA (2).REV
-
Size
1.3MB
-
Sample
231115-wew6haed6s
-
MD5
a465cd5d9881a91f4f26a99fb552f940
-
SHA1
afc63b5f96cfa3d19f6c666b3427ad01c8d89121
-
SHA256
02a5e0eff36234eb248ff92889e68c53ccc0fed6484178ce0a79ec24e85ac7dc
-
SHA512
62396fec885c2aee7ba7de32ad2e432f4dd3caed7fcc181064fd66726b07b743e66b0cd0b7f9b97605c115c15ab6e39d82e0b368fa0b0b3c069bdb7268e53cec
-
SSDEEP
24576:vb6EAUgtpCF/fSH1St7O4TXF+8Lg7egngU9HvBnJA/NKKnKl1m:T6QMpCF/OAt7OKU6g75nPHjA1Kdm
Static task
static1
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
Default
jauan2023.kozow.com:2107
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
#3 NOTIFICACION DEMANDA (2).REV
-
Size
1.3MB
-
MD5
a465cd5d9881a91f4f26a99fb552f940
-
SHA1
afc63b5f96cfa3d19f6c666b3427ad01c8d89121
-
SHA256
02a5e0eff36234eb248ff92889e68c53ccc0fed6484178ce0a79ec24e85ac7dc
-
SHA512
62396fec885c2aee7ba7de32ad2e432f4dd3caed7fcc181064fd66726b07b743e66b0cd0b7f9b97605c115c15ab6e39d82e0b368fa0b0b3c069bdb7268e53cec
-
SSDEEP
24576:vb6EAUgtpCF/fSH1St7O4TXF+8Lg7egngU9HvBnJA/NKKnKl1m:T6QMpCF/OAt7OKU6g75nPHjA1Kdm
-
Async RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-