General
-
Target
https://drive.usercontent.google.com/download?id=1RAVDxy-Rt9Mxfl4Nn6H5Cgo-qpzKb-jR&export=download
-
Sample
241209-3hjsxavqfw
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.usercontent.google.com/download?id=1RAVDxy-Rt9Mxfl4Nn6H5Cgo-qpzKb-jR&export=download
Resource
win10v2004-20241007-es
Malware Config
Extracted
https://desckvbrat.com.br/Upcrypter/01/DLL01.txt
https://drive.google.com/uc?export=download&id=
https://desckvbrat.com.br/Upcrypter/01/DLL01.txt
Extracted
https://desckvbrat.com.br/Upcrypter/01/DLL01.txt
https://drive.google.com/uc?export=download&id=
https://desckvbrat.com.br/Upcrypter/01/DLL01.txt
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
*** HOLA 9 DICIEMBRE **
holadic06.duckdns.org:9003
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
https://drive.usercontent.google.com/download?id=1RAVDxy-Rt9Mxfl4Nn6H5Cgo-qpzKb-jR&export=download
-
Asyncrat family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-