General
-
Target
script.ps1
-
Size
30B
-
Sample
240516-2alf4abd7t
-
MD5
76dd9af12f71e7232fd5b4f8f2a1e5ab
-
SHA1
ca6bb8a8b084f034fee6bd9055897dff8ccd5383
-
SHA256
5f6530be24f6ba44238a0e5edad83985cbe2447639876f01a8f05ee238d0f3f1
-
SHA512
f20c59ed2da9c83e7d3e7d7ad5648b24dd050a5fd484b9d9858138b32682eeacd03044b162cf97b50ca5b5f391b2c1ec607e71e0b77a382a2c0dd369746a0295
Static task
static1
Behavioral task
behavioral1
Sample
script.ps1
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
script.ps1
-
Size
30B
-
MD5
76dd9af12f71e7232fd5b4f8f2a1e5ab
-
SHA1
ca6bb8a8b084f034fee6bd9055897dff8ccd5383
-
SHA256
5f6530be24f6ba44238a0e5edad83985cbe2447639876f01a8f05ee238d0f3f1
-
SHA512
f20c59ed2da9c83e7d3e7d7ad5648b24dd050a5fd484b9d9858138b32682eeacd03044b162cf97b50ca5b5f391b2c1ec607e71e0b77a382a2c0dd369746a0295
Score8/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-