General
-
Target
mq.ps1
-
Size
3KB
-
Sample
231212-g4r6hsgbcj
-
MD5
24326ab1c24d34fd12effaf8f8b8d059
-
SHA1
af932ab0e35c0ff68f01e4855f1eeb1ec99328dc
-
SHA256
97c23ea238204d40737ed5e7249f88470bc3a7b2944c91e5c6ad1666a40cf188
-
SHA512
36483542c12dda14d0400ab6cd7d151bd5b39ef607b1639901f39cf469c515149f61c22f30ce8f41857fc8aadc7114c4b9144796465d5ced7676c9c7d120fe6b
Score
8/10
Static task
static1
Behavioral task
behavioral1
Sample
mq.ps1
Resource
win10-20231129-en
12 signatures
600 seconds
Malware Config
Targets
-
-
Target
mq.ps1
-
Size
3KB
-
MD5
24326ab1c24d34fd12effaf8f8b8d059
-
SHA1
af932ab0e35c0ff68f01e4855f1eeb1ec99328dc
-
SHA256
97c23ea238204d40737ed5e7249f88470bc3a7b2944c91e5c6ad1666a40cf188
-
SHA512
36483542c12dda14d0400ab6cd7d151bd5b39ef607b1639901f39cf469c515149f61c22f30ce8f41857fc8aadc7114c4b9144796465d5ced7676c9c7d120fe6b
Score8/10-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-