General

  • Target

    81011-DEMANDA JUDICIAL- 02(1).svg

  • Size

    268KB

  • Sample

    240527-yamsdage76

  • MD5

    88e9c96f75cd49362beff34e63b03e46

  • SHA1

    ba6876dffab45995f1b5640464dd5b5521c884b2

  • SHA256

    8a79a9309b9b15e89e79700eb0d183cbb4d6cac07e2d80d6d2156ce8c92e777c

  • SHA512

    45b5f2d1e9937870dd9a8962e519baaa60723a06af82fc7b1e8162ca28e925bc9f36c615c40605df6c92dd6a3ac92fadb7b2a4fa66d836a89dd9d105a319da86

  • SSDEEP

    3072://ba4VRSosuWVuiuWIuDujuquBzuzubKuPuXuGPwBbuKuFzuVuETruFu9yu9utu9://ba4+

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| CRACKED BY https://t.me/xworm_v2

Botnet

Default

C2

Dios123.kozow.com:1234

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      81011-DEMANDA JUDICIAL- 02(1).svg

    • Size

      268KB

    • MD5

      88e9c96f75cd49362beff34e63b03e46

    • SHA1

      ba6876dffab45995f1b5640464dd5b5521c884b2

    • SHA256

      8a79a9309b9b15e89e79700eb0d183cbb4d6cac07e2d80d6d2156ce8c92e777c

    • SHA512

      45b5f2d1e9937870dd9a8962e519baaa60723a06af82fc7b1e8162ca28e925bc9f36c615c40605df6c92dd6a3ac92fadb7b2a4fa66d836a89dd9d105a319da86

    • SSDEEP

      3072://ba4VRSosuWVuiuWIuDujuquBzuzubKuPuXuGPwBbuKuFzuVuETruFu9yu9utu9://ba4+

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks