General
-
Target
5dc2131b756479ca134a42f150f58e42.XZ
-
Size
3.2MB
-
Sample
241128-3r9qpa1kbm
-
MD5
5dc2131b756479ca134a42f150f58e42
-
SHA1
e6b57272f10a373e49315d7f301d30b1c66e4951
-
SHA256
a4f19a9864c086af408e8d0dce4ae4489e0cf07b1ada8ea947bca5f5c24bc445
-
SHA512
080e03d70f5dd0ba104f06b18571303481d3a54b65f4bdec7e281f6a041d9c20950c8a666abd4a3987ca660b054147358764e9f75867a955f719159228e178b0
-
SSDEEP
98304:+7RiBKLjlh6sGqSycKrc/JDTfyQ3lcp4TXkBkjtztbH0:+ECjlIASyoF3lckX+kjtztbH0
Static task
static1
Behavioral task
behavioral1
Sample
DEMANDA LABORAL POR ABUSO DE CONFIANZA 01/01 DEMANDA LABORAL POR ABUSO DE CONFIANZA.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DEMANDA LABORAL POR ABUSO DE CONFIANZA 01/01 DEMANDA LABORAL POR ABUSO DE CONFIANZA.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
DEMANDA LABORAL POR ABUSO DE CONFIANZA 01/WINMM.dll
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
PLATA
mastermrcol.net:7474
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
remcos
RemoteHost
mastermrcol.net:6565
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-89JTT1
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
DEMANDA LABORAL POR ABUSO DE CONFIANZA 01/01 DEMANDA LABORAL POR ABUSO DE CONFIANZA.exe
-
Size
2.3MB
-
MD5
5013571e104d9dd42ca2d94e81e430f8
-
SHA1
0e0e2b2f1688b77ebea638aa2e12f6462722fcb0
-
SHA256
9783cdd475c54ec21a035b5035c80329fa14be830c71c7c133de06ed98ad86d8
-
SHA512
c2a4fbb1231cb15fbe3a733c5477d7d0e95ae15cf9a5c7d53eeb452d6b5212a24754d596b90715cead5ae825c989afcacf14c33c1fd363a95cb86a0bc65f932e
-
SSDEEP
24576:oKkVrHgHx4mYlt+e5N2lWByqwSFg9NJo7thp9clBb2:Huri4LltP5NSn9NJIclBC
-
Asyncrat family
-
Remcos family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
-
-
Target
DEMANDA LABORAL POR ABUSO DE CONFIANZA 01/WINMM.dll
-
Size
5.0MB
-
MD5
9d9b59e2893e58686a0cc608522102bd
-
SHA1
b4a213c4f456ca191efc5711f0d2d819874444aa
-
SHA256
7b91d4680dd3d290703a50db25b751cb9c7c8b612c1bed0d389ce9ace1f81333
-
SHA512
327e63d2c5604210e8ba54d94fcd86b3dfeb91d0cf7af70110869d4f3aafbf00b4f8526defc9dcdeba36449d3fd9d6ddbb97a63ad169f4bbe8cb7a84b07ba218
-
SSDEEP
98304:XVo25lOF7FdfzW64cv5tQpgBZwy7zJDSiQCz+acvnIpeT+4:XVoGQJF7v5tQpgBZR7zJDSiQCz+acvI1
-
Asyncrat family
-
Remcos family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-