General
-
Target
upd.ps1
-
Size
1KB
-
Sample
241104-kg1qxsxfrc
-
MD5
901388115be5c8209d83642d8d5d9b51
-
SHA1
d2293a97b9772328bb60e822027063deffba0c4d
-
SHA256
b54e7cd114b771b8b81e8c9b461ab611c3a5fddc575bdf1da132f5863c5d1e72
-
SHA512
798c57ea2b8cce8fc050ac4bdb2b054bfa8b808c404dafcfa4b423ec1197e11a7150a12578963a0b5b863c465a705cc618e7d00c168635ffc6eb60f118a46d1c
Static task
static1
Behavioral task
behavioral1
Sample
upd.ps1
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
upd.ps1
Resource
win10v2004-20241007-en
Malware Config
Extracted
phemedrone
https://api.telegram.org/bot8091768794:AAFZsJ1h-6BiszgyLm-eH6c-uITQ7Z99Wbc/sendDocument
Targets
-
-
Target
upd.ps1
-
Size
1KB
-
MD5
901388115be5c8209d83642d8d5d9b51
-
SHA1
d2293a97b9772328bb60e822027063deffba0c4d
-
SHA256
b54e7cd114b771b8b81e8c9b461ab611c3a5fddc575bdf1da132f5863c5d1e72
-
SHA512
798c57ea2b8cce8fc050ac4bdb2b054bfa8b808c404dafcfa4b423ec1197e11a7150a12578963a0b5b863c465a705cc618e7d00c168635ffc6eb60f118a46d1c
-
Phemedrone family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-