Overview
overview
10Static
static
1Validació...1).eml
windows7-x64
5Validació...1).eml
windows10-2004-x64
3attachment-3.eml
windows7-x64
5attachment-3.eml
windows10-2004-x64
3email-html-2.html
windows7-x64
3email-html-2.html
windows10-2004-x64
10email-plain-1.txt
windows7-x64
1email-plain-1.txt
windows10-2004-x64
1image_2024...8Z.png
windows7-x64
3image_2024...8Z.png
windows10-2004-x64
3email-html-2.html
windows7-x64
3email-html-2.html
windows10-2004-x64
3email-plain-1.txt
windows7-x64
1email-plain-1.txt
windows10-2004-x64
1Resubmissions
17-10-2024 17:13
241017-vrvb1awdmb 10General
-
Target
Validación correo malicioso o SPAM(1).eml
-
Size
35KB
-
Sample
241017-vrvb1awdmb
-
MD5
4a17072e1d51f16e1c6d5c3a213926b2
-
SHA1
9aaef567835ff22e485f7ecdd35b36bc1e10075a
-
SHA256
f2624c49b428fdedc12def0ad228758838fa95ff84ca3194b555d15b7ad67acd
-
SHA512
738de31b526ca479ddfc55718f18ec302f6f64f062c14d7acf92707725adbc8b0e789a99d6b8e35391d27a542a1f1d5908b59e3bb88af70ff93e0d52ba31af98
-
SSDEEP
768:cHIn6NjRL9XtpF2rznNnMnQ31Y7Zear/7cOcv6UI:cHHJRJXtlnQOvlcc
Static task
static1
Behavioral task
behavioral1
Sample
Validación correo malicioso o SPAM(1).eml
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Validación correo malicioso o SPAM(1).eml
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
attachment-3.eml
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
attachment-3.eml
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
email-html-2.html
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
email-html-2.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
email-plain-1.txt
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
email-plain-1.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
image_2024_04_09T20_41_14_468Z.png
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
image_2024_04_09T20_41_14_468Z.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
email-html-2.html
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
email-html-2.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
email-plain-1.txt
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
email-plain-1.txt
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://pastebin.com/raw/Adv9gBHa
https://pastebin.com/raw/Adv9gBHa
Extracted
https://pastebin.com/raw/Adv9gBHa
https://pastebin.com/raw/Adv9gBHa
Extracted
https://pastebin.com/raw/Adv9gBHa
https://pastebin.com/raw/Adv9gBHa
Extracted
asyncrat
1.0.7
septiembre20
peinadorafael777.duckdns.org:2013
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
20agosto
carlitosmoreno1791.duckdns.org:2017
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
njrat
0.7NC
NYAN CAT
carlitosmoreno1794.duckdns.org:2019
bde06c84e1de4b23b
-
reg_key
bde06c84e1de4b23b
-
splitter
@!#&^%$
Targets
-
-
Target
Validación correo malicioso o SPAM(1).eml
-
Size
35KB
-
MD5
4a17072e1d51f16e1c6d5c3a213926b2
-
SHA1
9aaef567835ff22e485f7ecdd35b36bc1e10075a
-
SHA256
f2624c49b428fdedc12def0ad228758838fa95ff84ca3194b555d15b7ad67acd
-
SHA512
738de31b526ca479ddfc55718f18ec302f6f64f062c14d7acf92707725adbc8b0e789a99d6b8e35391d27a542a1f1d5908b59e3bb88af70ff93e0d52ba31af98
-
SSDEEP
768:cHIn6NjRL9XtpF2rznNnMnQ31Y7Zear/7cOcv6UI:cHHJRJXtlnQOvlcc
Score5/10-
Drops file in System32 directory
-
-
-
Target
attachment-3
-
Size
18KB
-
MD5
103afa82053ce0802035dcabd54973ec
-
SHA1
4acc5c297566be252ea624e19f29c59ef17a3ba9
-
SHA256
425f50f41e912666779bed290ea877584f94e8e708777f534422fe75d448eb9b
-
SHA512
5635ae3013ef677c2a2cbc1c751cc29762e7a74d5f48c7cc9a35acb14c627ca9ae8b2725f78647f82e0dc66538806844da125f5367f96a1077fd8e02d1a0fd84
-
SSDEEP
384:Yn1I1PFAXnwuw7bRPJKe99Qn7v/pdr3dRIOcv4LUS:X1Y7Zear/7cOcv6US
Score5/10-
Drops file in System32 directory
-
-
-
Target
email-html-2.txt
-
Size
1KB
-
MD5
e30672a61f4a8f232239d5046bb8d4ed
-
SHA1
82408b73208d1fc46cdd5f875e6fc139bac5dc34
-
SHA256
e8e74f88d1310a69c3092c2af288d0aeb9009bd80b7a6dcaf9a796362f82954e
-
SHA512
3e03339e04580ce4dc35058a722485077315767c36109576dc899919f09f4c5c1097f8fac5906e13b8f6170313c6a59e5151f06904e87730acce9405c7eaf7d5
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
-
-
Target
email-plain-1.txt
-
Size
563B
-
MD5
8a0bef196a40df6d235cf6ecc4ee2c69
-
SHA1
e8f3f995c5641bb320bc629e7ef4c7dc777289ce
-
SHA256
336fd49167c1af403c84f674ac567c438cb09e50a293fcc15e23605f4e858d23
-
SHA512
536df4f6162cc181512540f339d7e06b837054dcf00ba2902f60f249b57e7afd35416093889e74ee727d0d2cbccafca60703f5c727a472084251d6a4a1f1951e
Score1/10 -
-
-
Target
image_2024_04_09T20_41_14_468Z.png
-
Size
1KB
-
MD5
12a3a1b16e27498d1ff40eff38f5d37f
-
SHA1
38950aaf221c6e9a4692eba53857a5c88ba036ff
-
SHA256
d2fd656d3645252852aac4ca15c775829cac394394894dbc0768e613ef3837c9
-
SHA512
ae94eca920c5976170b33c74b83846cee3088e58b83cea5a734ede0af36ca9467aca14fed4bc7976f7b359261f865c867e4fd32ccbb66aff871d49531ffda47f
Score3/10 -
-
-
Target
email-html-2.txt
-
Size
5KB
-
MD5
21e70e0f8d7626060afff9ba687be884
-
SHA1
55cefb75a97f60bb3bd3f073b920c2e0313fd0c8
-
SHA256
17df5310b0e1d2e3bae41bfe1d5ea8331e466c7cf6b59ac54a2080827a82c5e5
-
SHA512
73832972c40be78bb0bbf3897eb6a2fefb0b175b9e258f537755b1d2bcdb19b22616bc852eec8d4cb029c160a2a5df1c17e3c6ef30a703b77d9df230822eb212
-
SSDEEP
96:Z7kpKxGKfOHU9rCzz2++rNrdbsmpb2HIndzK4aTf9qWrvDmdkYxiozJhG:ZtyR+ZRws2ondzJBWzKmeE
Score3/10 -
-
-
Target
email-plain-1.txt
-
Size
3KB
-
MD5
d8fff54334bf59859ec7eb075034329e
-
SHA1
4b9deecfd3bb2772550fd8915ae00c8e99577df4
-
SHA256
94fcc36ad9c6adc7c7a546e61a30ef9079f0a64780d2cda25df8428d562e2079
-
SHA512
5f916e4ec37c712f5e72820a19c96f9cb815658bb00713ac52f550f5e6072ec1be6efdb1ed6e0af451064e2d68c7117ef2f4dcf909609633a9caa07504bb0e39
Score1/10 -
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3