General
-
Target
1f0e0139de126efffc16fcc75b7f3584776f4fb2d8a30089aa8bf2bd592f2eae.zip
-
Size
5.5MB
-
Sample
241213-cmtkssvpaz
-
MD5
c68810bbd7cba359289da184e572adf9
-
SHA1
44fbfe4fac5614ffceab3d5ea0b3c41582585b80
-
SHA256
1f0e0139de126efffc16fcc75b7f3584776f4fb2d8a30089aa8bf2bd592f2eae
-
SHA512
d2286b2faab83866ba5beea5996c6cc9379e99d62b9e741facb1b60e6341314aadf2383f13847f5b8315277050c832bd9ad13763d56f84ad368b99479fcd9bcf
-
SSDEEP
98304:Q5uIipAPjnrSc7Xrecbpu0jAGuQU3HmajIu62wjbpSFbikGSyQ6LOWdGXleSil7g:onrScDpPkXm/bGdGnZLOW7B6KBh6lt
Static task
static1
Behavioral task
behavioral1
Sample
1 PROCESO FRAUDE FISCAL.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1 PROCESO FRAUDE FISCAL.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
tak_deco_lib.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
tak_deco_lib.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
PLATA
powerupsnew.dynuddns.com:7474
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
1 PROCESO FRAUDE FISCAL.exe
-
Size
12.0MB
-
MD5
a7118dffeac3772076f1a39a364d608d
-
SHA1
6b984d9446f23579e154ec47437b9cf820fd6b67
-
SHA256
f1973746ac0a703b23526f68c639436f0b26b0bc71c4f5adf36dc5f6e8a7f4d0
-
SHA512
f547c13b78acda9ca0523f0f8cd966c906f70a23a266ac86156dc7e17e6349e5f506366787e7a7823e2b07b0d614c9bd08e34ca5cc4f48799b0fe36ac836e890
-
SSDEEP
98304:ReAtQzKADvk/9TEaImN9/tiHBIn8c3hCEFRUTaZnPZOtXwH:ReAOWOM/FE1mNHiFc3hr7UTaZnhOtXwH
-
Asyncrat family
-
Suspicious use of SetThreadContext
-
-
-
Target
tak_deco_lib.dll
-
Size
315KB
-
MD5
ed00ffeccc0f63387993338d31c753b0
-
SHA1
c7f55119ab5d4477f0ca2156bb70c048f810449c
-
SHA256
0c85a67ceca005ec019df765769aefc7644311d0b791070463fdf6fe2b13c94c
-
SHA512
baeb2233c79fb663a7a5bda12b6a90d2416d651876118021c842be69a6a9d42fbc3e12f2e6616d50e1b807d3eb9d2a02529e63126044b287e42cdcc74a893f24
-
SSDEEP
3072:t0brJmz6/K6UwambkfOhOmesG+4ny2lV0C84:G5mz6/s2IfmRHAyQVJ
Score1/10 -