General
-
Target
xiyiY9q6.exe
-
Size
566B
-
Sample
230701-j8pbjagc38
-
MD5
795e5808a22d295b42bd2b67d77848f1
-
SHA1
4f544e8be9183f3148accbdf8b606037fa5f0393
-
SHA256
09341ab84768fcf4b3ea7dbb8e6ae17cbf72a10ec47d6895eff017b049f886f8
-
SHA512
8f6447c3dcd22430122289a1ea25018686392589433446eea3d769d5f2437fac02822e7ac1fbc201b7d06008698c7b92373efcb8295e4a39bbf8073fda736b31
Static task
static1
Behavioral task
behavioral1
Sample
xiyiY9q6.ps1
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
xiyiY9q6.ps1
Resource
win10v2004-20230621-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
Aluminio13
Targets
-
-
Target
xiyiY9q6.exe
-
Size
566B
-
MD5
795e5808a22d295b42bd2b67d77848f1
-
SHA1
4f544e8be9183f3148accbdf8b606037fa5f0393
-
SHA256
09341ab84768fcf4b3ea7dbb8e6ae17cbf72a10ec47d6895eff017b049f886f8
-
SHA512
8f6447c3dcd22430122289a1ea25018686392589433446eea3d769d5f2437fac02822e7ac1fbc201b7d06008698c7b92373efcb8295e4a39bbf8073fda736b31
Score10/10-
Blocklisted process makes network request
-