General
-
Target
file01.ps1
-
Size
49B
-
Sample
241231-apqwksvrgn
-
MD5
0758afe276a0b0cd5f4f152b256c2bb4
-
SHA1
bac13aeb38a66e5df9add1b542cc10a2165dcf35
-
SHA256
e35d7ef701e2a95c6a9f13e379aeb8aac96dd99573e02d87daee3dd120322bce
-
SHA512
919d93999119f069490b03bcb5153a3f35cd43d1814d1b924ea422c6d6528ff8e78b3643507993f8950c78fe0290cc1c23a0e709fb5854f6ddae2d7802576f8d
Static task
static1
Behavioral task
behavioral1
Sample
file01.ps1
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
file01.ps1
-
Size
49B
-
MD5
0758afe276a0b0cd5f4f152b256c2bb4
-
SHA1
bac13aeb38a66e5df9add1b542cc10a2165dcf35
-
SHA256
e35d7ef701e2a95c6a9f13e379aeb8aac96dd99573e02d87daee3dd120322bce
-
SHA512
919d93999119f069490b03bcb5153a3f35cd43d1814d1b924ea422c6d6528ff8e78b3643507993f8950c78fe0290cc1c23a0e709fb5854f6ddae2d7802576f8d
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops startup file
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-