General
-
Target
https://cdn.discordapp.com/attachments/1243203862500999374/1243263413614940170/NOTIFICACION_ELECTORNICA_J_RADICADO_1531385313551_0000_2024_000_3.js?ex=6650d6c8&is=664f8548&hm=0209b0819f3b00abfda0edff87eeaefa05c4577eebb47aadcd0f1725f5e1d42e&
-
Sample
240523-z2k9asgg79
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1243203862500999374/1243263413614940170/NOTIFICACION_ELECTORNICA_J_RADICADO_1531385313551_0000_2024_000_3.js?ex=6650d6c8&is=664f8548&hm=0209b0819f3b00abfda0edff87eeaefa05c4577eebb47aadcd0f1725f5e1d42e&
Resource
win10v2004-20240508-en
Malware Config
Extracted
asyncrat
1.0.7
23 2 3 23
camabinga1.duckdns.org:9004
DcRatMutex_dnchweun
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
https://cdn.discordapp.com/attachments/1243203862500999374/1243263413614940170/NOTIFICACION_ELECTORNICA_J_RADICADO_1531385313551_0000_2024_000_3.js?ex=6650d6c8&is=664f8548&hm=0209b0819f3b00abfda0edff87eeaefa05c4577eebb47aadcd0f1725f5e1d42e&
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-