General
-
Target
3465-Proceso Judicial Rad. 23001461299320240019100 Procuraduria General.zip
-
Size
966KB
-
Sample
241127-th9vnazqf1
-
MD5
f382d83461a2fd5f5aa4e7d1313cdc44
-
SHA1
ecaa5d44a5951b9d562ae03fe276c40b1cd44167
-
SHA256
55ec1346895f43da5a2af477e4cfdf8ff6783c3f20a55d9dffdf727fd4ab9a76
-
SHA512
8e5537d04947397e288a98eef7a5afa11c22f65886d144e78ae9f89346d147f6f7cf687ec74c4a4233b5d6ab1499500c5b6d40d28cd7998a51062b918a76e865
-
SSDEEP
24576:fUjHfERDNiZoJtL47ZYQNTGDeQEU001DoR933QFHcth9:fqHaN2oJtchGDe5ULeL33m8r9
Static task
static1
Behavioral task
behavioral1
Sample
3465-Proceso Judicial Rad. 23001461299320240019100 Procuraduria General.zip
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
asyncrat
1.0.7
GORRA
94.103.125.231:2626
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
3465-Proceso Judicial Rad. 23001461299320240019100 Procuraduria General.zip
-
Size
966KB
-
MD5
f382d83461a2fd5f5aa4e7d1313cdc44
-
SHA1
ecaa5d44a5951b9d562ae03fe276c40b1cd44167
-
SHA256
55ec1346895f43da5a2af477e4cfdf8ff6783c3f20a55d9dffdf727fd4ab9a76
-
SHA512
8e5537d04947397e288a98eef7a5afa11c22f65886d144e78ae9f89346d147f6f7cf687ec74c4a4233b5d6ab1499500c5b6d40d28cd7998a51062b918a76e865
-
SSDEEP
24576:fUjHfERDNiZoJtL47ZYQNTGDeQEU001DoR933QFHcth9:fqHaN2oJtchGDe5ULeL33m8r9
Score10/10-
Asyncrat family
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-