General
-
Target
trwsfg.ps1
-
Size
1KB
-
Sample
250101-jm4jbs1qdq
-
MD5
22bae550672a11587c37ebb8dabeefef
-
SHA1
5c7951317700fd35bbfd39499473889c752f9164
-
SHA256
569775b523c853aa351d5832df2fdbb68fdaa8c05f9cc67289921f00a66c0157
-
SHA512
03f9028156f1ba8f4ee62537ddba10c7f7d5ab0cee8cac17c1ae43c0c57922ed8a70d03b780142708afcae9b4eb46bb9b275e8b746061620681a57a27674e92a
Static task
static1
Behavioral task
behavioral1
Sample
trwsfg.ps1
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
trwsfg.ps1
-
Size
1KB
-
MD5
22bae550672a11587c37ebb8dabeefef
-
SHA1
5c7951317700fd35bbfd39499473889c752f9164
-
SHA256
569775b523c853aa351d5832df2fdbb68fdaa8c05f9cc67289921f00a66c0157
-
SHA512
03f9028156f1ba8f4ee62537ddba10c7f7d5ab0cee8cac17c1ae43c0c57922ed8a70d03b780142708afcae9b4eb46bb9b275e8b746061620681a57a27674e92a
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops startup file
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-