General
-
Target
PW Loader.zip
-
Size
312KB
-
Sample
250227-lv2qtavks6
-
MD5
671700cca3ce98e640c388a002a7762a
-
SHA1
ad02bb430ff3c0afa8eccee2cdff7d89e5020387
-
SHA256
25d72728eb6cbb742beb57aab0840e798d3188c2567911cf5e7cd39d81bb7efe
-
SHA512
22f225a2670da9f248626e5fc59837ec06389b8614b1805865ae136d7405ed05e7ce309fdd4274c6dcee768373241b64d2e4be9b269d1bb173e5d4ce211d0398
-
SSDEEP
6144:dl1szEUBUAFqvViDYti59WvgEIvDZLgfbZwKyrfhTi/R+ZMhy3VPAPV1IK:NszEUBU7vsDypvPYDZLgfbZwJJTi/EyB
Static task
static1
Behavioral task
behavioral1
Sample
PW Loader.exe
Resource
win11-20250217-en
Malware Config
Targets
-
-
Target
PW Loader.exe
-
Size
353KB
-
MD5
56643e8d47bf957982131424f5813be5
-
SHA1
3a3f934194846aca94feb191711c310221013cc3
-
SHA256
fcf8b6406f92a604fa5f8972fc48e55c1790a63abbcb72811984e35515cdf058
-
SHA512
805f0252c41bee936f96f0584f393d84248dbe1ed8efbc71dd8a5b0246db55e5cfeaf1b50508e8517252bfe2f9a0e9f119a0fbb0d83f9e33714fd3ecc63ac69d
-
SSDEEP
6144:/2HTwL6csbaj/4vtvL33qzYti59EvgEINhclb/wjVbtzRup1JFD+wMoxrM:/76c4pH8yBvPKC/wjVbt0hFDfPxrM
-
Nanocore family
-
Executes dropped EXE
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1