General
-
Target
61270d6564a80eff42a00bf542fc79224949fb27df8c1d6d3acbaa6000fc8577.ps1
-
Size
2KB
-
Sample
250103-d5nb6s1kcl
-
MD5
898d5189a1dc57fa7a80b4d986ef77c9
-
SHA1
aeb3667119b2fda564f498d26c04758caf44b1c5
-
SHA256
61270d6564a80eff42a00bf542fc79224949fb27df8c1d6d3acbaa6000fc8577
-
SHA512
d8cc4add28939f7072fad657b863f0e49ae420bae27a952db499f66caebbda79ff29a552f12ef0cd2cbd1d32003c0db940f0a16bceca196cd3684472c0c2e8c8
Static task
static1
Behavioral task
behavioral1
Sample
61270d6564a80eff42a00bf542fc79224949fb27df8c1d6d3acbaa6000fc8577.ps1
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
61270d6564a80eff42a00bf542fc79224949fb27df8c1d6d3acbaa6000fc8577.ps1
-
Size
2KB
-
MD5
898d5189a1dc57fa7a80b4d986ef77c9
-
SHA1
aeb3667119b2fda564f498d26c04758caf44b1c5
-
SHA256
61270d6564a80eff42a00bf542fc79224949fb27df8c1d6d3acbaa6000fc8577
-
SHA512
d8cc4add28939f7072fad657b863f0e49ae420bae27a952db499f66caebbda79ff29a552f12ef0cd2cbd1d32003c0db940f0a16bceca196cd3684472c0c2e8c8
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-