General
-
Target
script.ps1
-
Size
28KB
-
Sample
230413-rrz1psdc8t
-
MD5
5201bec05304172eb34578a483da40da
-
SHA1
e4a91fd21e16639f759009a17e1f37df5c89f2b4
-
SHA256
5a2366fb3d365e87f77a982d83eefb5054d50e8e73d2043979e5616c7071a458
-
SHA512
7ea8de19029a90502fd6a472e1b449cdbf017a19e679d3383b34aea2af1e392de6216934640fd9d8c47fb8553759cde0880291ff2d187081ff9896746a276353
-
SSDEEP
768:gPPLA+zYgibawLt4CGwmGGler9PdnH1LiGK:eT7zgbaItpdmGKyxdnViR
Static task
static1
Malware Config
Extracted
jupyter
OC-8
http://37.221.114.23
Targets
-
-
Target
script.ps1
-
Size
28KB
-
MD5
5201bec05304172eb34578a483da40da
-
SHA1
e4a91fd21e16639f759009a17e1f37df5c89f2b4
-
SHA256
5a2366fb3d365e87f77a982d83eefb5054d50e8e73d2043979e5616c7071a458
-
SHA512
7ea8de19029a90502fd6a472e1b449cdbf017a19e679d3383b34aea2af1e392de6216934640fd9d8c47fb8553759cde0880291ff2d187081ff9896746a276353
-
SSDEEP
768:gPPLA+zYgibawLt4CGwmGGler9PdnH1LiGK:eT7zgbaItpdmGKyxdnViR
-
Jupyter Backdoor/Client payload
-
Blocklisted process makes network request
-
Drops startup file
-