General

  • Target

    NOTIFICO DERECHO DE PETICION; BAJO EL RADICADO 774830-2025.zip

  • Size

    1.7MB

  • Sample

    250130-y1wsza1qbx

  • MD5

    9e89974150fe175eb34de6c41f66c6a8

  • SHA1

    7fbdb5abcf31c1ea0cbc07cf53023e8b03d21613

  • SHA256

    d9b503b414fa39dcb215936ff0b32be1b2f423970ceea89f077eff9ed88d25a5

  • SHA512

    ebebbc249937ae7576ae3edb7b29c5d563cd2a8208d79ae0c4168345679a89c74b9f4ed80e6c9a243b1cfc6d301e77d021ae4aa416685509cd47af4afd0e0524

  • SSDEEP

    24576:fJ4EBBa7bSXJ0+JrTBW1pfRlZAMNexhz9msvpsD33/PFiq0VByRb1DSmZ0XRBpt7:/Bv3kp5lpN2gsvpsD3l10LyRhDCPtzv

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

ff

C2

85.31.47.59:8848

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      NOTIFICO DERECHO DE PETICION; BAJO EL RADICADO 774830-2025..exe

    • Size

      4.3MB

    • MD5

      d459191c46fe47459df7c3ca0ebdcf9d

    • SHA1

      e37f0be08a980f9425440422b922563f72529076

    • SHA256

      946ee9f5d6e40bc70775ca64e640dab42dd837315d3dea79e5e965d94e77080c

    • SHA512

      7f6cf43360a80373335438d8994ff1d8c853ed067be51eff4c5584bebd61084881b380f9b206cd2f20288ab6ea8ae16f0cc5144b59ea7917d02af23582514902

    • SSDEEP

      49152:hCXtvRXOhEc2MgyXuTEGQpOEaIZaFChW7ZajQVM0RFC1zNURFZufu4vbRF:hCxRXOhEc2MgYHTpokQVMcFAp8FZQ1F

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks