General

  • Target

    password.txt.lnk

  • Size

    701B

  • Sample

    210115-vqs9vrrrpa

  • MD5

    954d37bb7d20be351e2aeb89ba70a79c

  • SHA1

    eca297fe4ad255ea9bd53294a3da3c449c17551f

  • SHA256

    e927ad9f7f2787687004afe8687f28409d282f4a63d8840661345126c7b8f14e

  • SHA512

    37cc8f55ffa4c2e9ad65e7afaa82d726ec811e521eb9771300d066f600348ba5fbf5771f834ae9dbe4df0e2dc7511b4e0d741c164315327333812181ff37cf67

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://192.168.5.128:8000/svchost.ps1

Targets

    • Target

      password.txt.lnk

    • Size

      701B

    • MD5

      954d37bb7d20be351e2aeb89ba70a79c

    • SHA1

      eca297fe4ad255ea9bd53294a3da3c449c17551f

    • SHA256

      e927ad9f7f2787687004afe8687f28409d282f4a63d8840661345126c7b8f14e

    • SHA512

      37cc8f55ffa4c2e9ad65e7afaa82d726ec811e521eb9771300d066f600348ba5fbf5771f834ae9dbe4df0e2dc7511b4e0d741c164315327333812181ff37cf67

    Score
    10/10
    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks