General
-
Target
gh.ps1
-
Size
3.0MB
-
Sample
230203-xq7xtada31
-
MD5
bd5d0e34444ce843ceaf89e3d043689b
-
SHA1
48ca53702e02f4e3e1c5a3af765909dd3496ccde
-
SHA256
b4dd3e93356329c076c0d2cd5ac30a806daf46006bdb81199355952e9d949424
-
SHA512
9ff668ca794d4759132e893b6b31883ceefd0698e7b165427af8e62ca24bf7a75c3cc45758a3f1c9982370d4d37518d1e012c78a9bb2e007040c97677eeeb91d
-
SSDEEP
49152:zY1wOeTfeinwRg0Yd0YtWdR2++BqkPiblNmBZOqsHtL3rdyW6JKHINYMpnkq/3+k:R
Static task
static1
Behavioral task
behavioral1
Sample
gh.ps1
Resource
win7-20220812-en
Malware Config
Extracted
xworm
147.185.221.223:30420
gnN7BZB0mS3RfWcg
-
install_file
USB.exe
Targets
-
-
Target
gh.ps1
-
Size
3.0MB
-
MD5
bd5d0e34444ce843ceaf89e3d043689b
-
SHA1
48ca53702e02f4e3e1c5a3af765909dd3496ccde
-
SHA256
b4dd3e93356329c076c0d2cd5ac30a806daf46006bdb81199355952e9d949424
-
SHA512
9ff668ca794d4759132e893b6b31883ceefd0698e7b165427af8e62ca24bf7a75c3cc45758a3f1c9982370d4d37518d1e012c78a9bb2e007040c97677eeeb91d
-
SSDEEP
49152:zY1wOeTfeinwRg0Yd0YtWdR2++BqkPiblNmBZOqsHtL3rdyW6JKHINYMpnkq/3+k:R
-
Suspicious use of SetThreadContext
-