General
-
Target
A9BFeimw.exe
-
Size
3KB
-
Sample
230701-hr2pvsgh7x
-
MD5
e02fc646a9299c2d8f1812327236eca4
-
SHA1
13712dc6272bd9e580acce92cdb9e0525c670ec1
-
SHA256
12973ee847edb898e705716046e6c81b86709f85a9a60a73fd17280963aba826
-
SHA512
3268dc87dde6611fc459e1d233566709376eccb5196781d32497ee9390847cd09c3fe3ca80b320592d7764430242fc27be5b4f0aa041dc7a0f4b5e70e817d499
Static task
static1
Behavioral task
behavioral1
Sample
A9BFeimw.ps1
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
A9BFeimw.ps1
Resource
win10v2004-20230621-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.mail.com - Port:
587 - Username:
[email protected] - Password:
Dung@@0931817708
Targets
-
-
Target
A9BFeimw.exe
-
Size
3KB
-
MD5
e02fc646a9299c2d8f1812327236eca4
-
SHA1
13712dc6272bd9e580acce92cdb9e0525c670ec1
-
SHA256
12973ee847edb898e705716046e6c81b86709f85a9a60a73fd17280963aba826
-
SHA512
3268dc87dde6611fc459e1d233566709376eccb5196781d32497ee9390847cd09c3fe3ca80b320592d7764430242fc27be5b4f0aa041dc7a0f4b5e70e817d499
Score10/10-
Blocklisted process makes network request
-