General
-
Target
vfrcxq.ps1
-
Size
1KB
-
Sample
250101-jqy31s1ran
-
MD5
0cdc732f0ded614eb23c08213bcf1e04
-
SHA1
0cbca39b7b1a0ec9b930c38c1c60d50feed74ee3
-
SHA256
7e129f68ebb1e8730941dcf50344e256bd0e32f29cac0e641426b88a17e131c6
-
SHA512
86c92258d18f25c97215c68cd4ef09b0c1433ea9de27c00247537ea8a7c187d4428b1cb151c785d5544f17da8ba9b138ef59efd3c7f7546240bf7ae5a5b29eb7
Static task
static1
Behavioral task
behavioral1
Sample
vfrcxq.ps1
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
vfrcxq.ps1
-
Size
1KB
-
MD5
0cdc732f0ded614eb23c08213bcf1e04
-
SHA1
0cbca39b7b1a0ec9b930c38c1c60d50feed74ee3
-
SHA256
7e129f68ebb1e8730941dcf50344e256bd0e32f29cac0e641426b88a17e131c6
-
SHA512
86c92258d18f25c97215c68cd4ef09b0c1433ea9de27c00247537ea8a7c187d4428b1cb151c785d5544f17da8ba9b138ef59efd3c7f7546240bf7ae5a5b29eb7
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-