General
-
Target
02-NOTIFICACION DEMANDA -JUZGADO 01 PENAL DEL CIRCUITO (4).zip
-
Size
2.4MB
-
Sample
240718-spspaaxekf
-
MD5
e4f27c032a3ba538296e99013839e440
-
SHA1
ecc45526d009afc8e504ecef128cc96cdb6932d1
-
SHA256
b788a361bc35172e96fcbc836873a9079dba5ca3d31f2767331dd821b4cb5eee
-
SHA512
28cdbc81744a0b979e78f5777f3d187d9e8f12fb54fdf8bae665a20ae3611ffb6086f71d506b4704455036bc83c641c86a7d6f0a623c394c7e3c35fb2fa2a3f2
-
SSDEEP
49152:E1cfopJCZvkX7QJ3Iy2/eK02o1GtmfhGX0H6kKmHrfIhUoN5lS5DJ42:iwkk1l2josa0EH6MrIyj5Dp
Static task
static1
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
Default
melo2024.kozow.com:8000
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
AnsyFelix
-
install_folder
%AppData%
Targets
-
-
Target
02-NOTIFICACION DEMANDA -JUZGADO 01 PENAL DEL CIRCUITO (4).zip
-
Size
2.4MB
-
MD5
e4f27c032a3ba538296e99013839e440
-
SHA1
ecc45526d009afc8e504ecef128cc96cdb6932d1
-
SHA256
b788a361bc35172e96fcbc836873a9079dba5ca3d31f2767331dd821b4cb5eee
-
SHA512
28cdbc81744a0b979e78f5777f3d187d9e8f12fb54fdf8bae665a20ae3611ffb6086f71d506b4704455036bc83c641c86a7d6f0a623c394c7e3c35fb2fa2a3f2
-
SSDEEP
49152:E1cfopJCZvkX7QJ3Iy2/eK02o1GtmfhGX0H6kKmHrfIhUoN5lS5DJ42:iwkk1l2josa0EH6MrIyj5Dp
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-