General
-
Target
target.ps1
-
Size
76B
-
Sample
250220-tpggpaxrez
-
MD5
a7719ce770225ad8fd81d6ad8ee8eec2
-
SHA1
bf61e43b55a0c29362e4e152cc77040981a4fd17
-
SHA256
3f7920a0497fdf8ee49a81e8c1ded39ac30610a758589086e5aad0cd3ccd26f9
-
SHA512
9a0feb19432c689ee5edeb2438f4a2d652f10b68539968fa4ff84b17c6df5e3b2831823051994f4a45829ba78eb2c6281cb72da666769a00ca37687f6c01b6ac
Static task
static1
Behavioral task
behavioral1
Sample
target.ps1
Resource
win7-20240903-en
Malware Config
Extracted
http://45.61.159.14/t/saw
Targets
-
-
Target
target.ps1
-
Size
76B
-
MD5
a7719ce770225ad8fd81d6ad8ee8eec2
-
SHA1
bf61e43b55a0c29362e4e152cc77040981a4fd17
-
SHA256
3f7920a0497fdf8ee49a81e8c1ded39ac30610a758589086e5aad0cd3ccd26f9
-
SHA512
9a0feb19432c689ee5edeb2438f4a2d652f10b68539968fa4ff84b17c6df5e3b2831823051994f4a45829ba78eb2c6281cb72da666769a00ca37687f6c01b6ac
-
SectopRAT payload
-
Sectoprat family
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-