General
-
Target
trwsfg.ps1
-
Size
1KB
-
Sample
250103-k89g5szlak
-
MD5
87cb99ee4cbf9c8c190da786ff51cc5e
-
SHA1
70fcc5113233216e878781682befcedddf85eda2
-
SHA256
81c941402a1bcf018d8d965f700229b5815d03ba02ca9f2d1a22c8ace0476972
-
SHA512
85200ea2189e6e860286b9d0637698a9cf6c03380030816202e3ed0554da39bf01300470a0345f7c05b297e04e4603c2f226618fae9422d833ba22b5a47bfe6d
Static task
static1
Behavioral task
behavioral1
Sample
trwsfg.ps1
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
trwsfg.ps1
-
Size
1KB
-
MD5
87cb99ee4cbf9c8c190da786ff51cc5e
-
SHA1
70fcc5113233216e878781682befcedddf85eda2
-
SHA256
81c941402a1bcf018d8d965f700229b5815d03ba02ca9f2d1a22c8ace0476972
-
SHA512
85200ea2189e6e860286b9d0637698a9cf6c03380030816202e3ed0554da39bf01300470a0345f7c05b297e04e4603c2f226618fae9422d833ba22b5a47bfe6d
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Venomrat family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops startup file
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-