General

  • Target

    quZtuaf0.posh

  • Size

    3KB

  • Sample

    230329-yx3r4shg33

  • MD5

    ff1ef674dd573524d0a0f1eb025f6eb3

  • SHA1

    63c60b274b4c3eeab1733620f8a229c9a1472f56

  • SHA256

    31c20d8ef052334c3e2d3bf165c02f20eb3ae7fdc0cb92981d4ba77c29007cf8

  • SHA512

    b2d85237bb3ec304544387283d0b6b6da737c1f461b7c49df5b0c61d417fa8411ec3365136630e1f27abf6de99e6023fa2c9ab834196611d0b95482316afef27

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.mail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    korn0809130096

Targets

    • Target

      quZtuaf0.posh

    • Size

      3KB

    • MD5

      ff1ef674dd573524d0a0f1eb025f6eb3

    • SHA1

      63c60b274b4c3eeab1733620f8a229c9a1472f56

    • SHA256

      31c20d8ef052334c3e2d3bf165c02f20eb3ae7fdc0cb92981d4ba77c29007cf8

    • SHA512

      b2d85237bb3ec304544387283d0b6b6da737c1f461b7c49df5b0c61d417fa8411ec3365136630e1f27abf6de99e6023fa2c9ab834196611d0b95482316afef27

    Score
    10/10
    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks