General
-
Target
qW8M5HSy.exe
-
Size
1KB
-
Sample
230701-j3v7wsgb83
-
MD5
46b44392c9693a9754b03fd87d7ae625
-
SHA1
4ef82030802e3872564be8d399108826d45cc757
-
SHA256
1e9908eba3da4476e637db3f86365aa0b339ca9b6f203187f922b354d8c99925
-
SHA512
ae4ff7faa5c15b586da1c6adc656e420a6a8f4fc9e1deecfa91f4270561edb555b037a4fb5d548664a3e9352bc98e22dc773410611a4489280f284fd1268f6c3
Static task
static1
Behavioral task
behavioral1
Sample
qW8M5HSy.ps1
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
qW8M5HSy.ps1
Resource
win10v2004-20230621-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
root1234!
Targets
-
-
Target
qW8M5HSy.exe
-
Size
1KB
-
MD5
46b44392c9693a9754b03fd87d7ae625
-
SHA1
4ef82030802e3872564be8d399108826d45cc757
-
SHA256
1e9908eba3da4476e637db3f86365aa0b339ca9b6f203187f922b354d8c99925
-
SHA512
ae4ff7faa5c15b586da1c6adc656e420a6a8f4fc9e1deecfa91f4270561edb555b037a4fb5d548664a3e9352bc98e22dc773410611a4489280f284fd1268f6c3
Score10/10-
Blocklisted process makes network request
-