General

  • Target

    #3 NOTIFICACION DEMANDA (2).REV

  • Size

    1.3MB

  • Sample

    231115-wew6haed6s

  • MD5

    a465cd5d9881a91f4f26a99fb552f940

  • SHA1

    afc63b5f96cfa3d19f6c666b3427ad01c8d89121

  • SHA256

    02a5e0eff36234eb248ff92889e68c53ccc0fed6484178ce0a79ec24e85ac7dc

  • SHA512

    62396fec885c2aee7ba7de32ad2e432f4dd3caed7fcc181064fd66726b07b743e66b0cd0b7f9b97605c115c15ab6e39d82e0b368fa0b0b3c069bdb7268e53cec

  • SSDEEP

    24576:vb6EAUgtpCF/fSH1St7O4TXF+8Lg7egngU9HvBnJA/NKKnKl1m:T6QMpCF/OAt7OKU6g75nPHjA1Kdm

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| CRACKED BY https://t.me/xworm_v2

Botnet

Default

C2

jauan2023.kozow.com:2107

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      #3 NOTIFICACION DEMANDA (2).REV

    • Size

      1.3MB

    • MD5

      a465cd5d9881a91f4f26a99fb552f940

    • SHA1

      afc63b5f96cfa3d19f6c666b3427ad01c8d89121

    • SHA256

      02a5e0eff36234eb248ff92889e68c53ccc0fed6484178ce0a79ec24e85ac7dc

    • SHA512

      62396fec885c2aee7ba7de32ad2e432f4dd3caed7fcc181064fd66726b07b743e66b0cd0b7f9b97605c115c15ab6e39d82e0b368fa0b0b3c069bdb7268e53cec

    • SSDEEP

      24576:vb6EAUgtpCF/fSH1St7O4TXF+8Lg7egngU9HvBnJA/NKKnKl1m:T6QMpCF/OAt7OKU6g75nPHjA1Kdm

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Async RAT payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks