General
-
Target
df300540e4f9d825f765e85a269f881e.001
-
Size
9KB
-
Sample
241126-2px4fazngj
-
MD5
df300540e4f9d825f765e85a269f881e
-
SHA1
10bd137f4217a7399ecb925754934780b0144ec9
-
SHA256
272e59a8e2a586fcefe28bdab59c1e557a935017c186804f5fd46f9079058fff
-
SHA512
e284d3cf2a9346f3a06f9716042b9b9dba6f20b2f392da69afc8c8c975fe8928214b81b7194ba801773fa60fe0d91aa7ad051fb1a26398754c05409c4e5454ea
-
SSDEEP
192:kl0E5xRPMqe1Y6LWvhrj8wQEstCnpmcUsSDwUEjbDuKUvqi/JO0:y0EXVLcY6i9yEY+XBSibDISF0
Static task
static1
Behavioral task
behavioral1
Sample
00254-ENVIO COPIA DE LA NOTIFICACION ELECTRONICA DEMANDA JUZGADO PENAL CIRCUITO RAMA JUDICIAL/012-EN.vbs
Resource
win7-20240903-en
Malware Config
Extracted
https://pastebin.com/raw/rE7gKnsP
https://pastebin.com/raw/rE7gKnsP
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
Default
perroshp.duckdns.org:3030
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
00254-ENVIO COPIA DE LA NOTIFICACION ELECTRONICA DEMANDA JUZGADO PENAL CIRCUITO RAMA JUDICIAL/012-ENVIO NOTIFICACION ELECTRONICA.vbs
-
Size
30.4MB
-
MD5
2063532fceeb572f8611f222dffd01ed
-
SHA1
f0d1938c04c06c9fa2f9f64408159f8a18404e0a
-
SHA256
980a6398745d8c656a7270b782d779c7328ceffa91e8bafb2020d0983ee1c1aa
-
SHA512
5bd582557408bd505e6c586690b12cd3a7463372c6f4aa1801c76d75dee7ad1c31a2515f3f508d875c806fc7d7f1a1e7be3e4f451029ff548346bfae0e2a3a97
-
SSDEEP
384:SHPHPHPHPHPHPHPHPHPHPHPHPHPHPHPHPHPHPHPHPHPHPHPHPHPHPHPHPHPHPHPA:eECOzjL1
-
Asyncrat family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-