General
-
Target
ACTA DEL EXPEDIENTE N° 4528-2932-22.exe
-
Size
1.5MB
-
Sample
240722-swsymavaqg
-
MD5
af378b7909440034d7400a16d28675fe
-
SHA1
c10fa3770480f1147a230130802e60916a2bb459
-
SHA256
6223e05abb8fda88b2cb2cc3a18199f1781db887d39f77426d9fce6579a97670
-
SHA512
a0d9cc46b4f3e87cca6a5dc7f6ba14b026864556282e824b3d179a0bd241829b773aa9ed52d6b949ecfe330a40dd1b8a26c88c25ba665d5bab3a0d4ec00b3754
-
SSDEEP
49152:0i0mLW8TZ70RwLL3mMjrQE0gGp03TGFeJgc8XtJrYtVdZTROwF8NRLdCg4g6e3di:5B32MoNgfTScMJxKbL5Yo
Static task
static1
Behavioral task
behavioral1
Sample
ACTA DEL EXPEDIENTE N° 4528-2932-22.exe
Resource
win7-20240704-en
Malware Config
Extracted
asyncrat
1.0.7
julio 16
linternadc24.duckdns.org:2222
windowsnfdvfgdjsllcpqwaxvmnvgddwqgxz
-
delay
10
-
install
false
-
install_file
windowsfender
-
install_folder
%AppData%
Extracted
njrat
0.7NC
NYAN CAT
desquare27.duckdns.org:6060
b54424da43d94f
-
reg_key
b54424da43d94f
-
splitter
@!#&^%$
Targets
-
-
Target
ACTA DEL EXPEDIENTE N° 4528-2932-22.exe
-
Size
1.5MB
-
MD5
af378b7909440034d7400a16d28675fe
-
SHA1
c10fa3770480f1147a230130802e60916a2bb459
-
SHA256
6223e05abb8fda88b2cb2cc3a18199f1781db887d39f77426d9fce6579a97670
-
SHA512
a0d9cc46b4f3e87cca6a5dc7f6ba14b026864556282e824b3d179a0bd241829b773aa9ed52d6b949ecfe330a40dd1b8a26c88c25ba665d5bab3a0d4ec00b3754
-
SSDEEP
49152:0i0mLW8TZ70RwLL3mMjrQE0gGp03TGFeJgc8XtJrYtVdZTROwF8NRLdCg4g6e3di:5B32MoNgfTScMJxKbL5Yo
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-