Static task
static1
Behavioral task
behavioral1
Sample
nD0MGrLg.ps1
Resource
win7-20230220-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
nD0MGrLg.ps1
Resource
win10v2004-20230221-en
2 signatures
150 seconds
General
-
Target
nD0MGrLg.posh
-
Size
1KB
-
MD5
29a113d1533ee3cec1484a86bccd283a
-
SHA1
e546c190228ae0c48b5e60bad4e509824a3ea44a
-
SHA256
ee6bedc1de71f7303bd6e052fdfcc9f590d956b027a43bf03ac3c8d7a59ddf48
-
SHA512
38b509d1aa47aeae8036ed08d67fdf9e3e67ae78ad4784213ad7597774d90aae0c4a91c495c3774c2e790199df6f6d39a6ed9eab0b4b350da6a9e8ad1c37562f
Score
10/10
Malware Config
Extracted
Language
ps1
Source
URLs
exe.dropper
https://discord.com/api/webhooks/1089875357617893447/Oa2yOLsRc5HN3b3_LTjC948IE7G0a-LsuMPNAtg_y0aMA-L8vWUghthY4i7H7UNqmyqH
Signatures
Files
-
nD0MGrLg.posh.ps1