General
-
Target
installAgent.ps1
-
Size
5KB
-
Sample
230721-khvw3acg52
-
MD5
c73ae14672e82e0c28b55557e2867e62
-
SHA1
bad14b7e2c561d0b1651f5732d7a0b7795b0de3b
-
SHA256
9eee2cadf40bb350a094563313b2167769e625a404b09d6fec220143f418932c
-
SHA512
c9a2cbd39562aeb6a50cd473a335eed358871374b4561649843b7695bc7b4c0c04274e6abb89c42238df33d5afc80699432c382dd6e93ff78c01b63a2247e590
-
SSDEEP
96:5POiwV7DNGEFLV3EqcktoCadnQnT71yTmKTgD4InLRsx4T+:VObDNGOL7DadQU9kD9f+
Static task
static1
Behavioral task
behavioral1
Sample
installAgent.ps1
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
installAgent.ps1
Resource
win10v2004-20230703-en
Malware Config
Extracted
http://agent.nigano.net:53/Windows_Agent.zip
Targets
-
-
Target
installAgent.ps1
-
Size
5KB
-
MD5
c73ae14672e82e0c28b55557e2867e62
-
SHA1
bad14b7e2c561d0b1651f5732d7a0b7795b0de3b
-
SHA256
9eee2cadf40bb350a094563313b2167769e625a404b09d6fec220143f418932c
-
SHA512
c9a2cbd39562aeb6a50cd473a335eed358871374b4561649843b7695bc7b4c0c04274e6abb89c42238df33d5afc80699432c382dd6e93ff78c01b63a2247e590
-
SSDEEP
96:5POiwV7DNGEFLV3EqcktoCadnQnT71yTmKTgD4InLRsx4T+:VObDNGOL7DadQU9kD9f+
Score8/10-
Blocklisted process makes network request
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-