General
-
Target
Notifica Demanda Ref. 25421208-2024 Admite Juzgado Civil.Tar
-
Size
918KB
-
Sample
241101-rda5es1erf
-
MD5
61a102ca87cf67688a738bb3fefc8d24
-
SHA1
e5305654a242ce03a45b1da667d632f74eb50a25
-
SHA256
b9c39d6afb42a4bb5a0d79b2404d4ede5c52bdf930b6c0e7ee3fd9830ec117cc
-
SHA512
ac08402b118942de387f63ba08e3016813dd942b660c8a57336baa53c47fedf2ad159b4f1a983139b970fbf5888e7651126f6e8806e2fcae4fd19e869fac8dff
-
SSDEEP
24576:qXceahwpfZhdbN3OKALB+hUJgNzrrSux1NmKnW54NS3tsh:Rewwp/hNu+MQrmaJx4uh
Static task
static1
Malware Config
Extracted
asyncrat
1.0.7
OCTU30
mjjhfyftuf.duckdns.org:8010
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
| Edit 3LOSH RAT
Default
oooptesg.duckdns.org:8020
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Notifica Demanda Ref. 25421208-2024 Admite Juzgado Civil.Tar
-
Size
918KB
-
MD5
61a102ca87cf67688a738bb3fefc8d24
-
SHA1
e5305654a242ce03a45b1da667d632f74eb50a25
-
SHA256
b9c39d6afb42a4bb5a0d79b2404d4ede5c52bdf930b6c0e7ee3fd9830ec117cc
-
SHA512
ac08402b118942de387f63ba08e3016813dd942b660c8a57336baa53c47fedf2ad159b4f1a983139b970fbf5888e7651126f6e8806e2fcae4fd19e869fac8dff
-
SSDEEP
24576:qXceahwpfZhdbN3OKALB+hUJgNzrrSux1NmKnW54NS3tsh:Rewwp/hNu+MQrmaJx4uh
-
Asyncrat family
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1