General
-
Target
1c98e715eb65ef733d18ece227297105e5dcea55ab37dc177778da3ff714da21.ps1
-
Size
168B
-
Sample
250103-dsgc4aznhn
-
MD5
2dc54835b9c45ed739a864b1732f7cd6
-
SHA1
7df3a0414a8972dcb6c025f14646d8570a117b40
-
SHA256
1c98e715eb65ef733d18ece227297105e5dcea55ab37dc177778da3ff714da21
-
SHA512
42a57f6d58b302e3a239dbb2e1f282d1b8d1446f93bc60e65933da64361a876c238d12b2eae3ab53eaf20f1973888714363e628beb9d718a9f5d827416aea40f
Static task
static1
Behavioral task
behavioral1
Sample
1c98e715eb65ef733d18ece227297105e5dcea55ab37dc177778da3ff714da21.ps1
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
1c98e715eb65ef733d18ece227297105e5dcea55ab37dc177778da3ff714da21.ps1
-
Size
168B
-
MD5
2dc54835b9c45ed739a864b1732f7cd6
-
SHA1
7df3a0414a8972dcb6c025f14646d8570a117b40
-
SHA256
1c98e715eb65ef733d18ece227297105e5dcea55ab37dc177778da3ff714da21
-
SHA512
42a57f6d58b302e3a239dbb2e1f282d1b8d1446f93bc60e65933da64361a876c238d12b2eae3ab53eaf20f1973888714363e628beb9d718a9f5d827416aea40f
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops startup file
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-