General
-
Target
trigger.ps1
-
Size
206B
-
Sample
241018-as792ayarn
-
MD5
6e7306dbcd8896748113d6ca8385e0bf
-
SHA1
44ddde9ee19bc7eeaa1b8fdc2460936881403995
-
SHA256
fd2c10222bcdde1db8a8bf18c5a8c98c828e5245f4d840f57d77b9f91ee9d772
-
SHA512
2c44b1be95cfd547f78a110b8a32f9e1b0eb2334a392ae96517eb9762e99946c09814c4e93fe77b760c26ad0c4400948e4770766574d42f2822c43c59ebc316b
Static task
static1
Behavioral task
behavioral1
Sample
trigger.ps1
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
trigger.ps1
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
trigger.ps1
-
Size
206B
-
MD5
6e7306dbcd8896748113d6ca8385e0bf
-
SHA1
44ddde9ee19bc7eeaa1b8fdc2460936881403995
-
SHA256
fd2c10222bcdde1db8a8bf18c5a8c98c828e5245f4d840f57d77b9f91ee9d772
-
SHA512
2c44b1be95cfd547f78a110b8a32f9e1b0eb2334a392ae96517eb9762e99946c09814c4e93fe77b760c26ad0c4400948e4770766574d42f2822c43c59ebc316b
Score8/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-