General
-
Target
z.png
-
Size
879B
-
Sample
240319-znqxmafd24
-
MD5
b1b9f0a88530b0bab19a3df123950423
-
SHA1
7e9ac27ab2453fc444091d4768d90321941bc17f
-
SHA256
4431712d10e9f14bcbd31dba91597782d4a4edafa88ca78eb5118ff7446f4566
-
SHA512
19c41cbd459bd3f41275ce69729c6d17daadd3c85dd072d950d69b7f55d062febe502e1a62b98e2cf66a8a9f07e8cfc11dec811b343b1fb1dfc4f077cc6e1d07
Static task
static1
Behavioral task
behavioral1
Sample
z.ps1
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
z.ps1
Resource
win10v2004-20240226-en
Malware Config
Extracted
http://193.233.132.136/a/a.png
http://193.233.132.136/a/0x.png
Extracted
bitrat
1.38
193.233.132.136:4404
-
communication_password
93d93f0d629d26b535ee4c950717ab2b
-
tor_process
tor
Targets
-
-
Target
z.png
-
Size
879B
-
MD5
b1b9f0a88530b0bab19a3df123950423
-
SHA1
7e9ac27ab2453fc444091d4768d90321941bc17f
-
SHA256
4431712d10e9f14bcbd31dba91597782d4a4edafa88ca78eb5118ff7446f4566
-
SHA512
19c41cbd459bd3f41275ce69729c6d17daadd3c85dd072d950d69b7f55d062febe502e1a62b98e2cf66a8a9f07e8cfc11dec811b343b1fb1dfc4f077cc6e1d07
Score10/10-
Blocklisted process makes network request
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-