General
-
Target
IMAGENES FOTO COMPARENDOS SIMIT INFRACCIONES DETALLES #2024-666663265889-999658959-PDF.vbs
-
Size
207KB
-
Sample
241208-y3bktatmfw
-
MD5
6fb4803325e9551ee65380e39a58b250
-
SHA1
8fd05fec3c193676864b0eec7a4d5ba1a118b4ea
-
SHA256
f2210b872fa03ec869ad401139fb07405005043d9adeae4ae9bcc0a837b9b249
-
SHA512
23c4922fc122038050e1cb37fe728910d5d013bec36a3aecf7ff83148ade88e6df31f4e554a104e17e301dfd7690fe7abfebbba12522c95e422d9c7e3089f899
-
SSDEEP
384:2747Y7474747Y7474747Y7474747Y7474747Y7474747Y7474747Y7474747Y74Y:Clz/X
Static task
static1
Behavioral task
behavioral1
Sample
IMAGENES FOTO COMPARENDOS SIMIT INFRACCIONES DETALLES #2024-666663265889-999658959-PDF.vbs
Resource
win7-20240708-en
Malware Config
Extracted
https://pastebin.com/raw/0FK5ax2D
Extracted
asyncrat
1.0.7
14
sanchezsanchez2024.duckdns.org:6666
DcRatMutex_qwqdanchunSFDGHSDF
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
IMAGENES FOTO COMPARENDOS SIMIT INFRACCIONES DETALLES #2024-666663265889-999658959-PDF.vbs
-
Size
207KB
-
MD5
6fb4803325e9551ee65380e39a58b250
-
SHA1
8fd05fec3c193676864b0eec7a4d5ba1a118b4ea
-
SHA256
f2210b872fa03ec869ad401139fb07405005043d9adeae4ae9bcc0a837b9b249
-
SHA512
23c4922fc122038050e1cb37fe728910d5d013bec36a3aecf7ff83148ade88e6df31f4e554a104e17e301dfd7690fe7abfebbba12522c95e422d9c7e3089f899
-
SSDEEP
384:2747Y7474747Y7474747Y7474747Y7474747Y7474747Y7474747Y7474747Y74Y:Clz/X
-
Asyncrat family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Suspicious use of SetThreadContext
-