General
-
Target
PROCESO DEMANDA.zip
-
Size
4.7MB
-
Sample
240706-zpvbfavcjf
-
MD5
2435e5727ef702c7edc53b94d5fe1297
-
SHA1
5ad2f23f1cec09327ab32cdc8a0aa55d9e2e94c9
-
SHA256
39bca464cf2a0b8749f41db48cc53480bd130062288a188b78c090621b49d3af
-
SHA512
7120e716fdcf7ddfcee649b52b47ef4e18b67cfe502e41fcd726ed25066b1d2d7695f0dd8f996406e5cc2b1ad4181b3b0267f5231c4b214ddd63400f54b6fce0
-
SSDEEP
98304:s3ZMuIoibSw1EdfMgNIJiImgEJlWqyeekv++EKlLf041vNh5TdgdFarTr/t8wSL:yZMOPdfMohIoDyt4LTnhUdQ3t8r
Static task
static1
Behavioral task
behavioral1
Sample
PROCESO DEMANDA/01 NOTIFICACION DEMANDA.exe
Resource
win10v2004-20240704-en
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
Default
briana2024.kozow.com:5050
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
PROCESO DEMANDA/01 NOTIFICACION DEMANDA.exe
-
Size
446KB
-
MD5
485008b43f0edceba0e0d3ca04bc1c1a
-
SHA1
55ae8f105af415bb763d1b87f6572f078052877c
-
SHA256
12c22ba646232d5d5087d0300d5cfd46fed424f26143a02dc866f1bfceab3c10
-
SHA512
402652786daae635c7405f5fa0924d768cbde2086f9f57b10f00f921dec98e37168f5c3a6baa5593ba9a478f3971d32747c517ffd485d25634c924e6b08815b1
-
SSDEEP
12288:vK5+DMJA3TAz4plk9iZOOti81N5y1qMIg+GV5Zul3M:y5+DMJA3TAz4plk9ijK1qlGV7ulM
-
Suspicious use of SetThreadContext
-