General
-
Target
PW Loader.zip
-
Size
312KB
-
Sample
250224-ln87bavpw4
-
MD5
a9cbda7b860fc868aae1e969c3619bb1
-
SHA1
95cf5de8332bfe1fee3402d484e2502a153a9c68
-
SHA256
80c22a635c8c465742fe3062fc705710d561ef1decc7094f22adc041bb2f15ed
-
SHA512
c7d8ff507a95ffbff6c9f7194c8f0636c9fd391c4aa5e4ae5f919861652dbc0c91d8a47c5444797edd8049f8ee387bbb45e355812a03fdc1675f71304b02540c
-
SSDEEP
6144:0VkRP2RdNr0BgTC05uzP3z8QQUl2R++gClBVMgTSHjnE3dA84l9x:0VkRuR70yl03z8QQysBVMvY3dAfl9x
Static task
static1
Behavioral task
behavioral1
Sample
PW Loader.exe
Resource
win11-20250217-en
Malware Config
Targets
-
-
Target
PW Loader.exe
-
Size
354KB
-
MD5
638ded3b1d340c2a35f1891759e11d3b
-
SHA1
e290bb38e046a6d2ceef5632f1c1ab1fefde4d93
-
SHA256
d46c7ba651d37e8e51e062320fa860fc7aa69b5ab142a91d614bf61a64b8f9eb
-
SHA512
b8e61d0b992e887abc87f20b8ed7bff65801e9b9288a2ed296e4f4e2e3e1f0192c9b74a831a0d59814de222e73e358a14b2ae623ac5dd61d896b0445f7a21ab2
-
SSDEEP
6144:/0XQ1m1ii5mwp+wR0O+VbL68KadaT6Cwfn/7NIY/Y+nNK2UX+8+Hxr:/0XQ1XQUweNbLBKa8T6CS/JaXJ+Hxr
-
Nanocore family
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1