General
-
Target
powershell.ps1
-
Size
853B
-
Sample
240827-k7mxratcjb
-
MD5
c79635d19d94bedf0aefb665db357057
-
SHA1
3b527e53bac2b5cde3f34ae9c9db2dcbd8c61c14
-
SHA256
29fb9be73a6eb6687cc4115e5acf02f8be0def40f974b45aaf5dc0ef8a2ca4ed
-
SHA512
e3a2883db926d04bb1991fcca4b99fa8b847882888df9252072e1af528345c541450db490e14c9236aa9906a72b7abbec5416447112eaef2502838f9be7101b0
Static task
static1
Behavioral task
behavioral1
Sample
powershell.ps1
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
powershell.ps1
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://drive.google.com/file/d/1pCPuK8UIb7FGJsWnk_6qcVdWXw9PfI3k/view?usp=sharing
Targets
-
-
Target
powershell.ps1
-
Size
853B
-
MD5
c79635d19d94bedf0aefb665db357057
-
SHA1
3b527e53bac2b5cde3f34ae9c9db2dcbd8c61c14
-
SHA256
29fb9be73a6eb6687cc4115e5acf02f8be0def40f974b45aaf5dc0ef8a2ca4ed
-
SHA512
e3a2883db926d04bb1991fcca4b99fa8b847882888df9252072e1af528345c541450db490e14c9236aa9906a72b7abbec5416447112eaef2502838f9be7101b0
Score8/10-
Blocklisted process makes network request
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-