General

  • Target

    10-CITACION DEMANDA EN SU CONTRA -JUZGADO 03 LABORAL CIRCUITO ESPECIALIZADO EXTINXION-10.svg

  • Size

    358KB

  • Sample

    240724-tljgwavdlq

  • MD5

    4e13471212cb4ed7b3800d329c3860bf

  • SHA1

    5647ce87843802b740ed953c50d80453823dd8f8

  • SHA256

    6768f27cadd154e4f98704f815901825550609b11d2a3f871aa3db97d351dc52

  • SHA512

    6fca249d5601b08f778b42495e01396865d2cb736369a5eba80ee1662fa4e39519c17bf6bc2e9fb44c2034fc0af973336cbae67167bdfdfe9a2826e60f590928

  • SSDEEP

    3072:RCkLBpCoMXyV1d/Cl+XlwdgrJGwS4BHKlge41unusvrvlvfvwvsvQv+xJWv46zwU:RfBpCoK21dE+XlpJGwSsKldhLsuCd

Malware Config

Extracted

Family

asyncrat

Version

| CRACKED BY https://t.me/xworm_v2

Botnet

Default

C2

melo2024.kozow.com:8000

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_file

    AnsyFelix

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      10-CITACION DEMANDA EN SU CONTRA -JUZGADO 03 LABORAL CIRCUITO ESPECIALIZADO EXTINXION-10.svg

    • Size

      358KB

    • MD5

      4e13471212cb4ed7b3800d329c3860bf

    • SHA1

      5647ce87843802b740ed953c50d80453823dd8f8

    • SHA256

      6768f27cadd154e4f98704f815901825550609b11d2a3f871aa3db97d351dc52

    • SHA512

      6fca249d5601b08f778b42495e01396865d2cb736369a5eba80ee1662fa4e39519c17bf6bc2e9fb44c2034fc0af973336cbae67167bdfdfe9a2826e60f590928

    • SSDEEP

      3072:RCkLBpCoMXyV1d/Cl+XlwdgrJGwS4BHKlge41unusvrvlvfvwvsvQv+xJWv46zwU:RfBpCoK21dE+XlpJGwSsKldhLsuCd

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks