General
-
Target
PythonPcCrasher.py
-
Size
2KB
-
Sample
241127-xnsp4sskfl
-
MD5
d24850b91f327ff7c4964f977f947765
-
SHA1
8484e62f2c6fbae5f6209b925628765c389610f5
-
SHA256
7690e785a0e17bb22a778afd21610bfe2e62a2f5d2a93e0d6b3ddab9f266437c
-
SHA512
bbdef8da1c04e13a16cad90231abcc1917af5b7e4310e08800f935b4973b61a815f85bf65442601cfdfeb15b0f584128f05b3966842e53b117f9e066f06746b7
Static task
static1
Behavioral task
behavioral1
Sample
PythonPcCrasher.py
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
PythonPcCrasher.py
-
Size
2KB
-
MD5
d24850b91f327ff7c4964f977f947765
-
SHA1
8484e62f2c6fbae5f6209b925628765c389610f5
-
SHA256
7690e785a0e17bb22a778afd21610bfe2e62a2f5d2a93e0d6b3ddab9f266437c
-
SHA512
bbdef8da1c04e13a16cad90231abcc1917af5b7e4310e08800f935b4973b61a815f85bf65442601cfdfeb15b0f584128f05b3966842e53b117f9e066f06746b7
Score7/10-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-