General
-
Target
code.ps1
-
Size
3KB
-
Sample
240809-m27fbateka
-
MD5
259ad591b830b483e84b4f995f35838e
-
SHA1
39be4b78a4f7d7956d21a6917f1687dc77d7847b
-
SHA256
865c27bc6fd0781cec11c4d0c0797e370a2e88f9db9f9aa25a72de7817a428fd
-
SHA512
b4eeff16b50c6b0f60fcc21a70b5a95358f8b3399fc6a08576b5e3751489462daf373be789832cefedb73fe07f959c33c499ff9f32b5e6da54f57061140c32ee
Static task
static1
Behavioral task
behavioral1
Sample
code.ps1
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
code.ps1
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://malicious-server.com/payload.exe
Targets
-
-
Target
code.ps1
-
Size
3KB
-
MD5
259ad591b830b483e84b4f995f35838e
-
SHA1
39be4b78a4f7d7956d21a6917f1687dc77d7847b
-
SHA256
865c27bc6fd0781cec11c4d0c0797e370a2e88f9db9f9aa25a72de7817a428fd
-
SHA512
b4eeff16b50c6b0f60fcc21a70b5a95358f8b3399fc6a08576b5e3751489462daf373be789832cefedb73fe07f959c33c499ff9f32b5e6da54f57061140c32ee
Score9/10-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-