General
-
Target
malware.ps1.ps1
-
Size
632KB
-
Sample
241118-xks7gatbnn
-
MD5
b51ce03f581892df4518a19c36819d32
-
SHA1
b16fd35868ee3381d04c8c8ec7a5cec2be7f7fd5
-
SHA256
64fa05b0833add3f4c0a7b92c758cddc707ac15c029b86735b4135ee272d72bf
-
SHA512
ea3c087ab4b219251273106e665d4d7157959ff33d0c473aa4e41848ee3a5011a8d924d97abbb2a098fbdb0d801183c4b92e7b3472f17a0dbd21063a7526f644
-
SSDEEP
12288:FyC892ilTl8aEE+DV2M3GQCsU43yKDGX9xL/xxMjypoMrCm042ruD:FyC8924WaEFDIsTCKD2zxxMxM2m0hr0
Static task
static1
Malware Config
Targets
-
-
Target
malware.ps1.ps1
-
Size
632KB
-
MD5
b51ce03f581892df4518a19c36819d32
-
SHA1
b16fd35868ee3381d04c8c8ec7a5cec2be7f7fd5
-
SHA256
64fa05b0833add3f4c0a7b92c758cddc707ac15c029b86735b4135ee272d72bf
-
SHA512
ea3c087ab4b219251273106e665d4d7157959ff33d0c473aa4e41848ee3a5011a8d924d97abbb2a098fbdb0d801183c4b92e7b3472f17a0dbd21063a7526f644
-
SSDEEP
12288:FyC892ilTl8aEE+DV2M3GQCsU43yKDGX9xL/xxMjypoMrCm042ruD:FyC8924WaEFDIsTCKD2zxxMxM2m0hr0
-
SectopRAT payload
-
Sectoprat family
-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-