General
-
Target
xenn.ps1
-
Size
279KB
-
Sample
250212-b6me6awqhs
-
MD5
9749e46693091c6de695c31006ac7795
-
SHA1
1170a294b8ace6633ae6154141151c15fe516095
-
SHA256
89bb879c72817b511d415cef263f4303784a3f8737a6bbf2b745887522b46ed6
-
SHA512
6ed8f03a7d8b38c013ae79abd937c3d662d87803ee56272ed239f43573ef905b1b58a2448de9fb691a2380efca74f935f76422c2267d2bb108329610b3f4cb81
-
SSDEEP
1536:6qzQRWW6wFEaeQ4pxff1C31i+XL2NXxtIVBM5ryOPe7:j4nLixtN+qd3y3
Static task
static1
Malware Config
Targets
-
-
Target
xenn.ps1
-
Size
279KB
-
MD5
9749e46693091c6de695c31006ac7795
-
SHA1
1170a294b8ace6633ae6154141151c15fe516095
-
SHA256
89bb879c72817b511d415cef263f4303784a3f8737a6bbf2b745887522b46ed6
-
SHA512
6ed8f03a7d8b38c013ae79abd937c3d662d87803ee56272ed239f43573ef905b1b58a2448de9fb691a2380efca74f935f76422c2267d2bb108329610b3f4cb81
-
SSDEEP
1536:6qzQRWW6wFEaeQ4pxff1C31i+XL2NXxtIVBM5ryOPe7:j4nLixtN+qd3y3
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Async RAT payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-