General

  • Target

    windowsdpc13.ps1

  • Size

    321B

  • Sample

    240716-k9sk1svfqm

  • MD5

    d884e90f4f0b146b1da66feafbeec1d9

  • SHA1

    0b804250f96337f1a0dd3ebeb5cb95d72378d4c0

  • SHA256

    f114d0b1f23314cc305a11b5c03f2ed2b92a8e7b333d423d97b72f83a7c6b9b8

  • SHA512

    6670076cff08fb66ec5aac09a283570222b3f0010e129df070e18264b104834f30ee1bbc1b13a5d633b98e622f0d62230039a713d0b7a626860f3093d308e20a

Score
8/10

Malware Config

Targets

    • Target

      windowsdpc13.ps1

    • Size

      321B

    • MD5

      d884e90f4f0b146b1da66feafbeec1d9

    • SHA1

      0b804250f96337f1a0dd3ebeb5cb95d72378d4c0

    • SHA256

      f114d0b1f23314cc305a11b5c03f2ed2b92a8e7b333d423d97b72f83a7c6b9b8

    • SHA512

      6670076cff08fb66ec5aac09a283570222b3f0010e129df070e18264b104834f30ee1bbc1b13a5d633b98e622f0d62230039a713d0b7a626860f3093d308e20a

    Score
    8/10
    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks