General

  • Target

    windowsdpc17.ps1

  • Size

    321B

  • Sample

    240716-lads9axhrh

  • MD5

    b173bd4cbeccfaacfb11cc85cced9cb0

  • SHA1

    6e78387486f61ea96886b4013759aef46a582e7b

  • SHA256

    d8e5180ecc3b6eb4919b13caf795103d27cd36227baf0460928234818be3a22d

  • SHA512

    31dc818667b3014fac99823c71d80a5a171f2c01a04039d048a1439179b8577fca1f179938f9bfe4017914e0933e33feca73329179c0b9f3b0131c539f8fb127

Score
8/10

Malware Config

Targets

    • Target

      windowsdpc17.ps1

    • Size

      321B

    • MD5

      b173bd4cbeccfaacfb11cc85cced9cb0

    • SHA1

      6e78387486f61ea96886b4013759aef46a582e7b

    • SHA256

      d8e5180ecc3b6eb4919b13caf795103d27cd36227baf0460928234818be3a22d

    • SHA512

      31dc818667b3014fac99823c71d80a5a171f2c01a04039d048a1439179b8577fca1f179938f9bfe4017914e0933e33feca73329179c0b9f3b0131c539f8fb127

    Score
    8/10
    • Blocklisted process makes network request

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks