General
-
Target
file01.ps1
-
Size
35B
-
Sample
250121-rd357sxper
-
MD5
684c57981b5ed26047c34aee9a2453a1
-
SHA1
2e154e9c0e6abc9a2bc852aeb941fe5d3117fa3e
-
SHA256
20b3dc9a088153eb974afee08192cd0b78c96b847e5705cea818c50043c3bddf
-
SHA512
cca14c6add1e0dfed54e0fe425489bf430bcc438acf386fe4d68cf040fbe55e9997b0d85bcd8cca56e66721292497894b599c919f3af248b4a2ef8a1d112c51b
Static task
static1
Behavioral task
behavioral1
Sample
file01.ps1
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
file01.ps1
-
Size
35B
-
MD5
684c57981b5ed26047c34aee9a2453a1
-
SHA1
2e154e9c0e6abc9a2bc852aeb941fe5d3117fa3e
-
SHA256
20b3dc9a088153eb974afee08192cd0b78c96b847e5705cea818c50043c3bddf
-
SHA512
cca14c6add1e0dfed54e0fe425489bf430bcc438acf386fe4d68cf040fbe55e9997b0d85bcd8cca56e66721292497894b599c919f3af248b4a2ef8a1d112c51b
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-