General
-
Target
DOCUMENTOSPROCESOLEGALANTEJUZGADOMUNICIPAL893872429.rar
-
Size
1.1MB
-
Sample
241126-t8m4kszkbt
-
MD5
8c0fd82b616bc6f85e99ec36db94b2de
-
SHA1
21247f6635621c57e98f3781b5012daf5ba732e6
-
SHA256
a882ef861459694139040550cc826dda328e30e6a01fc4775e6934e862e8ed39
-
SHA512
659ac7a6119415630fce246e41456682bff473fc9eb70963cffe978a21c52c62d0e337ee5de11601e10dc2eb9fb963832e1110c284bca55653bbe7c741cf7e00
-
SSDEEP
24576:aRT0oN4IGlkLC6agOcDlI4OpB/rkWsfE+h1s:al0o+laPagOcBmpB/YWC1s
Static task
static1
Behavioral task
behavioral1
Sample
DOCUMENTOS, PROCESO LEGAL ANTE JUZGADO MUNICIPAL 2938724639571290861428214935230984329.exe
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
0.5.7A
LOGAN
logann.duckdns.org:6606
uuooxuxbnkywum
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
DOCUMENTOS, PROCESO LEGAL ANTE JUZGADO MUNICIPAL 2938724639571290861428214935230984329.exe
-
Size
1.4MB
-
MD5
ef14f82a4981ca8453f7c3e5cdf89fe9
-
SHA1
adaf2e1d3fa7b14d1a8031972cba2498fe43af3e
-
SHA256
e9290645d565611e0bf0aeaf6c07dd719fb668b3a0f442e1245351b79f3f17c8
-
SHA512
037409e6b148963041aea16ba4f3f6f2b2550dbc99d80135073a2882e4fc642b99b012b9d7db6ecc2bd09427918ca13e89e9706abd8ada6c93002f8f450dc99f
-
SSDEEP
24576:SC0YSsCCuOA5saQsqr8p1I44Wc4rnIl0cURZojzl/r6pDxTvqgBS+nVA:gOAWjbryqTfGI1UEnlj6pD13xVA
-
Asyncrat family
-
Drops startup file
-
Suspicious use of SetThreadContext
-