General
-
Target
msg.txt
-
Size
10KB
-
Sample
241221-r37vpa1nes
-
MD5
5914e89bcedaaac02edcbb785434efdd
-
SHA1
26cee98c9b33feb10d4b56b292b9b6034529505d
-
SHA256
8e29f931f24567f7ccd5f4abee991cbedb741a999477a20b3b4d1ed57bb0ef88
-
SHA512
0e27804f24c308b3c8cf949857d29242602b041cd724cb0090de09ddf44f0c6d6c2e491418c643b1295aac6a619393fe3c9179cb94092b616532110f0504eef4
-
SSDEEP
192:OQQCEE5IutuAgqxWeFz1z2FQTixkEcnrYFQRiSZmEDtCyh/:JNxWkQFQ5r0FQYu/
Static task
static1
Behavioral task
behavioral1
Sample
msg.ps1
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://raw.githubusercontent.com/Notsurewtf/9219313923123313-systemkey-finder/main/ChangeLog.txt
https://raw.githubusercontent.com/Notsurewtf/shiny-tribble/refs/heads/main/funny
Targets
-
-
Target
msg.txt
-
Size
10KB
-
MD5
5914e89bcedaaac02edcbb785434efdd
-
SHA1
26cee98c9b33feb10d4b56b292b9b6034529505d
-
SHA256
8e29f931f24567f7ccd5f4abee991cbedb741a999477a20b3b4d1ed57bb0ef88
-
SHA512
0e27804f24c308b3c8cf949857d29242602b041cd724cb0090de09ddf44f0c6d6c2e491418c643b1295aac6a619393fe3c9179cb94092b616532110f0504eef4
-
SSDEEP
192:OQQCEE5IutuAgqxWeFz1z2FQTixkEcnrYFQRiSZmEDtCyh/:JNxWkQFQ5r0FQYu/
Score8/10-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-