General

  • Target

    powershell.ps1

  • Size

    853B

  • Sample

    240827-k7mxratcjb

  • MD5

    c79635d19d94bedf0aefb665db357057

  • SHA1

    3b527e53bac2b5cde3f34ae9c9db2dcbd8c61c14

  • SHA256

    29fb9be73a6eb6687cc4115e5acf02f8be0def40f974b45aaf5dc0ef8a2ca4ed

  • SHA512

    e3a2883db926d04bb1991fcca4b99fa8b847882888df9252072e1af528345c541450db490e14c9236aa9906a72b7abbec5416447112eaef2502838f9be7101b0

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://drive.google.com/file/d/1pCPuK8UIb7FGJsWnk_6qcVdWXw9PfI3k/view?usp=sharing

Targets

    • Target

      powershell.ps1

    • Size

      853B

    • MD5

      c79635d19d94bedf0aefb665db357057

    • SHA1

      3b527e53bac2b5cde3f34ae9c9db2dcbd8c61c14

    • SHA256

      29fb9be73a6eb6687cc4115e5acf02f8be0def40f974b45aaf5dc0ef8a2ca4ed

    • SHA512

      e3a2883db926d04bb1991fcca4b99fa8b847882888df9252072e1af528345c541450db490e14c9236aa9906a72b7abbec5416447112eaef2502838f9be7101b0

    Score
    8/10
    • Blocklisted process makes network request

    • Drops startup file

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks