General
-
Target
7nZuvhVp.exe
-
Size
3KB
-
Sample
230701-hn2kpagh5v
-
MD5
697fbb026fe9409970793b46745b59d8
-
SHA1
249362be20c5dcf194669d2d8b406ac3404c4542
-
SHA256
08927126f80138113f70e30a032cd6c925ddd95cc6c7fe09734249da71fc736a
-
SHA512
d8fedc1ab5aa2366c562fcb4311da14142f05e012aabc0657b762d7b58b5899842993f4db7dc6b7d6a984970324671512c3c00f645bcad5a05d926c0235a1fd4
Static task
static1
Behavioral task
behavioral1
Sample
7nZuvhVp.ps1
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
7nZuvhVp.ps1
Resource
win10v2004-20230621-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
9585053036
Targets
-
-
Target
7nZuvhVp.exe
-
Size
3KB
-
MD5
697fbb026fe9409970793b46745b59d8
-
SHA1
249362be20c5dcf194669d2d8b406ac3404c4542
-
SHA256
08927126f80138113f70e30a032cd6c925ddd95cc6c7fe09734249da71fc736a
-
SHA512
d8fedc1ab5aa2366c562fcb4311da14142f05e012aabc0657b762d7b58b5899842993f4db7dc6b7d6a984970324671512c3c00f645bcad5a05d926c0235a1fd4
Score10/10-
Blocklisted process makes network request
-