General

  • Target

    PROCESO DEMANDA.zip

  • Size

    4.7MB

  • Sample

    240706-zpvbfavcjf

  • MD5

    2435e5727ef702c7edc53b94d5fe1297

  • SHA1

    5ad2f23f1cec09327ab32cdc8a0aa55d9e2e94c9

  • SHA256

    39bca464cf2a0b8749f41db48cc53480bd130062288a188b78c090621b49d3af

  • SHA512

    7120e716fdcf7ddfcee649b52b47ef4e18b67cfe502e41fcd726ed25066b1d2d7695f0dd8f996406e5cc2b1ad4181b3b0267f5231c4b214ddd63400f54b6fce0

  • SSDEEP

    98304:s3ZMuIoibSw1EdfMgNIJiImgEJlWqyeekv++EKlLf041vNh5TdgdFarTr/t8wSL:yZMOPdfMohIoDyt4LTnhUdQ3t8r

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| CRACKED BY https://t.me/xworm_v2

Botnet

Default

C2

briana2024.kozow.com:5050

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      PROCESO DEMANDA/01 NOTIFICACION DEMANDA.exe

    • Size

      446KB

    • MD5

      485008b43f0edceba0e0d3ca04bc1c1a

    • SHA1

      55ae8f105af415bb763d1b87f6572f078052877c

    • SHA256

      12c22ba646232d5d5087d0300d5cfd46fed424f26143a02dc866f1bfceab3c10

    • SHA512

      402652786daae635c7405f5fa0924d768cbde2086f9f57b10f00f921dec98e37168f5c3a6baa5593ba9a478f3971d32747c517ffd485d25634c924e6b08815b1

    • SSDEEP

      12288:vK5+DMJA3TAz4plk9iZOOti81N5y1qMIg+GV5Zul3M:y5+DMJA3TAz4plk9ijK1qlGV7ulM

    Score
    10/10
    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Tasks