General
-
Target
599bb7becf556009af70229c4954b6dd.bin
-
Size
1KB
-
Sample
231009-b7a4hshd4w
-
MD5
e9ff963df8c6de6fcbfd9e157f0bb81b
-
SHA1
fa048e4e58a8e52fd01c5b69da11e7e55fad25b6
-
SHA256
6123b24d9c8894551cbfeb5093811ff6a61c4f5d95493b2f13d1f6136d0834a0
-
SHA512
31200270a2de6d635dae54abd6b2054e5021a18eee451788d115e7bf006c1547ee80a7b420988cb31c4b022702a982ae544dc7737db2fa5b39d0f2160869b091
Static task
static1
Behavioral task
behavioral1
Sample
f31ce6310c7980fd1ec98a273bb6efb569cd141ca87f60cf7e2491012698ebf8.ps1
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f31ce6310c7980fd1ec98a273bb6efb569cd141ca87f60cf7e2491012698ebf8.ps1
Resource
win10v2004-20230915-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.mail.com - Port:
587 - Username:
[email protected] - Password:
Lollo.1027
Targets
-
-
Target
f31ce6310c7980fd1ec98a273bb6efb569cd141ca87f60cf7e2491012698ebf8.unknown
-
Size
3KB
-
MD5
599bb7becf556009af70229c4954b6dd
-
SHA1
0d5846dafd94d9792f9f7fa9a94146953d6a7ef3
-
SHA256
f31ce6310c7980fd1ec98a273bb6efb569cd141ca87f60cf7e2491012698ebf8
-
SHA512
a1a942764ac87626bee7194510fd7a2dd0e83e1f89baa90370384dcadc0e5b56214d5d8336d411346f56a18d35263c1c40a074922f6b08d2b8a7489bb54623de
Score10/10-
Blocklisted process makes network request
-