General
-
Target
81011-DEMANDA JUDICIAL- 02(1).svg
-
Size
268KB
-
Sample
240527-yamsdage76
-
MD5
88e9c96f75cd49362beff34e63b03e46
-
SHA1
ba6876dffab45995f1b5640464dd5b5521c884b2
-
SHA256
8a79a9309b9b15e89e79700eb0d183cbb4d6cac07e2d80d6d2156ce8c92e777c
-
SHA512
45b5f2d1e9937870dd9a8962e519baaa60723a06af82fc7b1e8162ca28e925bc9f36c615c40605df6c92dd6a3ac92fadb7b2a4fa66d836a89dd9d105a319da86
-
SSDEEP
3072://ba4VRSosuWVuiuWIuDujuquBzuzubKuPuXuGPwBbuKuFzuVuETruFu9yu9utu9://ba4+
Static task
static1
Behavioral task
behavioral1
Sample
81011-DEMANDA JUDICIAL- 02(1).svg
Resource
win7-20240419-es
Behavioral task
behavioral2
Sample
81011-DEMANDA JUDICIAL- 02(1).svg
Resource
win10v2004-20240426-es
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
Default
Dios123.kozow.com:1234
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
81011-DEMANDA JUDICIAL- 02(1).svg
-
Size
268KB
-
MD5
88e9c96f75cd49362beff34e63b03e46
-
SHA1
ba6876dffab45995f1b5640464dd5b5521c884b2
-
SHA256
8a79a9309b9b15e89e79700eb0d183cbb4d6cac07e2d80d6d2156ce8c92e777c
-
SHA512
45b5f2d1e9937870dd9a8962e519baaa60723a06af82fc7b1e8162ca28e925bc9f36c615c40605df6c92dd6a3ac92fadb7b2a4fa66d836a89dd9d105a319da86
-
SSDEEP
3072://ba4VRSosuWVuiuWIuDujuquBzuzubKuPuXuGPwBbuKuFzuVuETruFu9yu9utu9://ba4+
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-