General

  • Target

    clZM1_NOTIFICACION DEMANDA LABORAL_clZM1.svg

  • Size

    591KB

  • Sample

    241107-v23fcswgln

  • MD5

    4a59432743a0b4b5d7e6a050a9e76ff4

  • SHA1

    0ea8706c297d98a9e883c7c798238267b67b82f9

  • SHA256

    928a12593295616bcc43ef7829d9d76a00d62e9381829b92e88b92e0bccd1083

  • SHA512

    897611fd251bfc6a60683f93f44642076f9e5e492d043d88777c03fd4017363a8b61208cde36adc97997feba52195b1bfc69e5d0374dbbd8b52363dd45de0fc7

  • SSDEEP

    6144:KLsuC+g8t5g0YBnsUdU1E6Rn4lDM/PMhapBLGvjn8iPr1CKxHxCvF:KLS6Uh/U1tVaoMY/LQAiPhCKLcF

Malware Config

Extracted

Family

asyncrat

Version

| CRACKED BY https://t.me/xworm_v2

Botnet

Default

C2

en2025en.duckdns.org:3030

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      clZM1_NOTIFICACION DEMANDA LABORAL_clZM1.svg

    • Size

      591KB

    • MD5

      4a59432743a0b4b5d7e6a050a9e76ff4

    • SHA1

      0ea8706c297d98a9e883c7c798238267b67b82f9

    • SHA256

      928a12593295616bcc43ef7829d9d76a00d62e9381829b92e88b92e0bccd1083

    • SHA512

      897611fd251bfc6a60683f93f44642076f9e5e492d043d88777c03fd4017363a8b61208cde36adc97997feba52195b1bfc69e5d0374dbbd8b52363dd45de0fc7

    • SSDEEP

      6144:KLsuC+g8t5g0YBnsUdU1E6Rn4lDM/PMhapBLGvjn8iPr1CKxHxCvF:KLS6Uh/U1tVaoMY/LQAiPhCKLcF

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks