General
-
Target
password.txt.lnk
-
Size
701B
-
Sample
210115-vqs9vrrrpa
-
MD5
954d37bb7d20be351e2aeb89ba70a79c
-
SHA1
eca297fe4ad255ea9bd53294a3da3c449c17551f
-
SHA256
e927ad9f7f2787687004afe8687f28409d282f4a63d8840661345126c7b8f14e
-
SHA512
37cc8f55ffa4c2e9ad65e7afaa82d726ec811e521eb9771300d066f600348ba5fbf5771f834ae9dbe4df0e2dc7511b4e0d741c164315327333812181ff37cf67
Static task
static1
Behavioral task
behavioral1
Sample
password.txt.lnk
Resource
win7v20201028
Malware Config
Extracted
http://192.168.5.128:8000/svchost.ps1
Targets
-
-
Target
password.txt.lnk
-
Size
701B
-
MD5
954d37bb7d20be351e2aeb89ba70a79c
-
SHA1
eca297fe4ad255ea9bd53294a3da3c449c17551f
-
SHA256
e927ad9f7f2787687004afe8687f28409d282f4a63d8840661345126c7b8f14e
-
SHA512
37cc8f55ffa4c2e9ad65e7afaa82d726ec811e521eb9771300d066f600348ba5fbf5771f834ae9dbe4df0e2dc7511b4e0d741c164315327333812181ff37cf67
Score10/10-
Drops file in System32 directory
-