Overview
overview
10Static
static
102a58deb886...91.exe
windows7-x64
72a58deb886...91.exe
windows10-2004-x64
72a8a0bca04...56.exe
windows7-x64
12a8a0bca04...56.exe
windows10-2004-x64
12a9ffe006a...34.exe
windows7-x64
102a9ffe006a...34.exe
windows10-2004-x64
102ab11ad915...2a.exe
windows7-x64
82ab11ad915...2a.exe
windows10-2004-x64
82ac1621a2b...d2.exe
windows7-x64
72ac1621a2b...d2.exe
windows10-2004-x64
72b3308a415...7b.exe
windows7-x64
72b3308a415...7b.exe
windows10-2004-x64
72b3fba9224...50.exe
windows7-x64
102b3fba9224...50.exe
windows10-2004-x64
102b820e3de5...95.exe
windows7-x64
72b820e3de5...95.exe
windows10-2004-x64
72b9233e0b0...ed.exe
windows7-x64
72b9233e0b0...ed.exe
windows10-2004-x64
72bb7c2979e...c6.exe
windows7-x64
102bb7c2979e...c6.exe
windows10-2004-x64
82bcc16cd37...1b.exe
windows7-x64
72bcc16cd37...1b.exe
windows10-2004-x64
72bf6115ff0...e6.exe
windows7-x64
102bf6115ff0...e6.exe
windows10-2004-x64
102bfb9d98d1...aa.exe
windows7-x64
32bfb9d98d1...aa.exe
windows10-2004-x64
32c1bb67a63...62.exe
windows7-x64
102c1bb67a63...62.exe
windows10-2004-x64
102c878e31ca...a9.exe
windows7-x64
92c878e31ca...a9.exe
windows10-2004-x64
92ccb525855...c9.exe
windows7-x64
12ccb525855...c9.exe
windows10-2004-x64
1General
-
Target
archive_11.zip
-
Size
133.7MB
-
Sample
250322-gwlzjayzcz
-
MD5
1352f22bfc03ab02b81e3853275739ff
-
SHA1
f9ccd670b60501698a672eb68527c70a33298b51
-
SHA256
d7108405eebedbd1d610c13bd7dae066a7ca5497f7e1c8c977a92b8401083709
-
SHA512
bcad6b7f5c2ab84828cc1fc2061f8ae3ec18168a33d3939e6908cb5cf5a8e0fdea5c7bab136418bbaf620713a053b724c8912efefc5b20deaa5a1e99738d2958
-
SSDEEP
3145728:b8tFNkFah1i8DzLEvVth4/8tFNk9g2Xfp9fUO6f7/TQNjh5CjI+w/k:b8tLZ73LEdjE8tLcgCLYjI+w/k
Behavioral task
behavioral1
Sample
2a58deb8862cf7fc15015cfdc2e12d91.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
2a58deb8862cf7fc15015cfdc2e12d91.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
2a8a0bca043dc99715ebb4415693e52371edde1f37fb8451d9175328fefa7456.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
2a8a0bca043dc99715ebb4415693e52371edde1f37fb8451d9175328fefa7456.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
2a9ffe006a29261c5f168fdf0fe26434.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
2a9ffe006a29261c5f168fdf0fe26434.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
2ab11ad915b74ff1dd9a0ab743f7bb2a.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
2ab11ad915b74ff1dd9a0ab743f7bb2a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
2ac1621a2b0813529021feefa223b3124176ec82974f0bc9b4b1365328e3d7d2.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
2ac1621a2b0813529021feefa223b3124176ec82974f0bc9b4b1365328e3d7d2.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral11
Sample
2b3308a4153ff3a99a4355a4b70e96779a5f60a820b4b65dcf1ffb6b6d5b4b7b.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
2b3308a4153ff3a99a4355a4b70e96779a5f60a820b4b65dcf1ffb6b6d5b4b7b.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral13
Sample
2b3fba9224cbcf82f7414bdb4108a150.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
2b3fba9224cbcf82f7414bdb4108a150.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
2b820e3de58782883087f0783d484f95.exe
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
2b820e3de58782883087f0783d484f95.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
2b9233e0b054ff4f7ea7d7a0a77e3fed.exe
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
2b9233e0b054ff4f7ea7d7a0a77e3fed.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
2bb7c2979e9372d006198745f13bf5c6.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
2bb7c2979e9372d006198745f13bf5c6.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
2bcc16cd37f40f56e357c814f3958491062e5be750c5c8dc9d077815d7f5461b.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
2bcc16cd37f40f56e357c814f3958491062e5be750c5c8dc9d077815d7f5461b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
2bf6115ff0a234d8ea278864c5abbbe6.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
2bf6115ff0a234d8ea278864c5abbbe6.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
2bfb9d98d1176802c3f20b3ed364ccaa.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
2bfb9d98d1176802c3f20b3ed364ccaa.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
2c1bb67a6359e933d609019759d98e62.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
2c1bb67a6359e933d609019759d98e62.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
2c878e31cad36b4acf60c3cbde88ebe56fdb1cd5d4bab9a60508b1023d3a33a9.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
2c878e31cad36b4acf60c3cbde88ebe56fdb1cd5d4bab9a60508b1023d3a33a9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
2ccb525855c096117a4ce773ceb6afc9.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
2ccb525855c096117a4ce773ceb6afc9.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
njrat
im523
Cracked
2.tcp.ngrok.io:15489
bfcd93b9dd810793ea187614b1cdc5e8
-
reg_key
bfcd93b9dd810793ea187614b1cdc5e8
-
splitter
|'|'|
Extracted
umbral
https://discord.com/api/webhooks/1351891077954797598/Z0Zrxyy5hS5H3Ryv4Nqt6pJaijqfFZI_-VfvTeEgIPU9M8d6BoQVB1Dq_LUKAZLuooI4
Extracted
xworm
days-locations.gl.at.ply.gg:65517
127.0.0.1:4255
september-liverpool.gl.at.ply.gg:4255
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
njrat
0.7d
HacKed
ufd1.no-ip.biz:5552
9087a867d845087488fdb240f77c691d
-
reg_key
9087a867d845087488fdb240f77c691d
-
splitter
|'|'|
Extracted
njrat
0.7d
MyBot
Alfaz-24806.portmap.host:24806
f273b02f99e5084d056482af20d33b89
-
reg_key
f273b02f99e5084d056482af20d33b89
-
splitter
Y262SUCZ4UJJ
Extracted
asyncrat
| nelsontriana980
LOADER
paisesbajos12.casacam.net:11102
paisesbajos12.casacam.net:11103
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
2a58deb8862cf7fc15015cfdc2e12d91.exe
-
Size
40.5MB
-
MD5
2a58deb8862cf7fc15015cfdc2e12d91
-
SHA1
682e9293a26c82ad925ac044a72b24d523cb2ea1
-
SHA256
a46761f2e749190b048aa4d2c0d1e21d5ee0c2959102bd13d164f9ce7209299a
-
SHA512
2eb1a1f233f0cd6967b591d1a0b5cbf8f90b33d81ab543527c6846643aacb744f668dda259e726c8b27576916a6ce2490c13eddc58db630c4e6869b1de5c7aa1
-
SSDEEP
786432:xFg84K+BeqgXXr0YXHvHnoalAYBULMEN4Iler1X/C9WEVxdVdENwtfJgyI7zmb:x6K+Bngnr0ovDeL9Jlk0WEVj7xJM7C
Score7/10-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
2a8a0bca043dc99715ebb4415693e52371edde1f37fb8451d9175328fefa7456.exe
-
Size
128KB
-
MD5
93a0ced9df323555924b05567cae7c55
-
SHA1
549db07d2441e0993ba6045c314ad26763285c9b
-
SHA256
2a8a0bca043dc99715ebb4415693e52371edde1f37fb8451d9175328fefa7456
-
SHA512
6a74df1c3022598a41a513fae598a8220f8ea36f97ec1cbc8273b7247613cdece59b0fad609665346e50c192bbaa3246a8d03eee5bf2c38739d716b0b8dbd360
-
SSDEEP
3072:c28RlusaYCyUfzbspKNMOccF6l3iMAelbWTz6fLYXDMxt:5RscyUMyMOUIGbWIS
Score1/10 -
-
-
Target
2a9ffe006a29261c5f168fdf0fe26434.exe
-
Size
1.6MB
-
MD5
2a9ffe006a29261c5f168fdf0fe26434
-
SHA1
f445b266e10c6aa8862836249b7191e6844daea7
-
SHA256
44e8546f8e588d48b8cff32d70abcef37d3e3612cc84097832eda999bf621b95
-
SHA512
03cf6be019011547574ef760b8a2cc16396c43f4b392a93fd52004bbb2df712751d085f081c4c55926756fe6b2186a801d6d2557080c675281966881fba8cc63
-
SSDEEP
24576:qsm8JijftfWIqZpyh/X6bSmV2GKz1oncoiF9GFwUvpHk3tSfEybcswrJ4gOEGEk:qD8Jijt+xpS/ekYmLGdhEAf7bCcjE
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
-
-
Target
2ab11ad915b74ff1dd9a0ab743f7bb2a.exe
-
Size
5.7MB
-
MD5
2ab11ad915b74ff1dd9a0ab743f7bb2a
-
SHA1
b0d2258559eb5d5bd58af52e68fe17fa4f99109c
-
SHA256
09b4c204845790b4a2cb57a569ee7151d94e038099e3c175807aa27e68bd919c
-
SHA512
a4cec88eba462ad4e20f267806379054629b736db8c670d7cccfa0ca12a97deb2152ea63b5371662701ca70ea214a029918f584ae89a0187c5ed81253b06a656
-
SSDEEP
98304:6b4j5YtLaDORGGPAgOUeocP/cjsuS34/4ccmvgJ9FzpI4iWBPzL6OKsgsXPhU4ln:6U5YdUGEJl+oI/BcqgD1SeLuOKsg8BEy
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
-
-
Target
2ac1621a2b0813529021feefa223b3124176ec82974f0bc9b4b1365328e3d7d2.exe
-
Size
1.4MB
-
MD5
907a89ef19de4e51298eb6ef3b2ca3a0
-
SHA1
dd9ad084860fb6582efba4cc7e14854502d288fe
-
SHA256
2ac1621a2b0813529021feefa223b3124176ec82974f0bc9b4b1365328e3d7d2
-
SHA512
0ddb00a707ea452eb82eb81feea604d7a4b56263009e3dbe5ce8e949e40d5e277c71b2ecc027850d3b0d421fafebdd445536050193de8a323e1a7dbd95f0a864
-
SSDEEP
24576:M8dvIOVmW6AbPsArkueRKmV3sNlHfiqJX:MowONbkBuyKmBs7d
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
2b3308a4153ff3a99a4355a4b70e96779a5f60a820b4b65dcf1ffb6b6d5b4b7b.exe
-
Size
510KB
-
MD5
b4f566f5a727720b1ff62aef921c0e0e
-
SHA1
f889fca2aa15e304d2a1a6f721bd40a03a9e5735
-
SHA256
2b3308a4153ff3a99a4355a4b70e96779a5f60a820b4b65dcf1ffb6b6d5b4b7b
-
SHA512
9a6c4e1236a7972a3ee56653d32fd49933ca023c08b1c90b1366c3457cf0f5746595b688c7bee626ea846eb92bf9482452dde3d7196bd9384874b1f8b51ed774
-
SSDEEP
1536:N4eK+IFjWfoPbuaTRM3nFkwHbaA3LL0idWwiQcmWkF7jV:G+IF6foPCaTRMXbaev0FQcmWkRV
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
2b3fba9224cbcf82f7414bdb4108a150.exe
-
Size
999KB
-
MD5
2b3fba9224cbcf82f7414bdb4108a150
-
SHA1
635d95fb9bab5e8064fad1dd0fa6092633931f38
-
SHA256
30af24055c179294f9ad01cf551c4cce6d901cbaaeaf371e4cc3a7f584e994ba
-
SHA512
e4a960c6a8d273ef0d8bcf7f9943d17b4d2c4cd7dfe5620afe46d16ec87f1bbf564fa0b298d6e5bff40a350c58913b5e4576c46a8adefa8775895c98400422f8
-
SSDEEP
12288:/9pLLk45WSSY1BX6f4bIS7rMNetPfC9Vs6IFGs0jxAqXj9xPSI0dzNgCoD7WX+Iu:/9pP5WS3lrMNyC9TJPCXBi
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
2b820e3de58782883087f0783d484f95.exe
-
Size
6.5MB
-
MD5
2b820e3de58782883087f0783d484f95
-
SHA1
b5a4c93813e01b10f948cd46e83ae16c64299284
-
SHA256
b5eaf05525428e4f6db4343e9070a7afefb91694926e3c75b7b0ec0d16cf57c8
-
SHA512
f48ad7fae5b3c453dd6e7a291836376865e690b20bca38e6465832dd6c5d7aa568f655939e4f3f530eec4285bf01b23e7acec72c52a691fd31d92e3b05bce984
-
SSDEEP
98304:0VgvtU3ioYGQlAkxpP2vrXGwy6T4ng5WbkTYFnZ2+mPjcElY5ZubP+uvq:0T2GIAkxpuvrXGwygzEFQ+pEl0Zuj
Score7/10-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
-
-
Target
2b9233e0b054ff4f7ea7d7a0a77e3fed.exe
-
Size
33.9MB
-
MD5
2b9233e0b054ff4f7ea7d7a0a77e3fed
-
SHA1
e88f81c3461ecd478e566907423f5f317540ae49
-
SHA256
b4993da36b30b3d8bfb6e3890a4f23247797de18c0a321fd1ccffbd5b89a486d
-
SHA512
bd1141ef789a34f485fe21b2c1c8239489c73eee900e1bc1e248bda5927de8817be8189da4f6a764cedfcd72739e4b26c06c6da805f161328c1a6e63e11c2152
-
SSDEEP
786432:xFg84K+BeqgXXr72zF2dTCLhg7/p/Vi7glkL1cNN:x6K+Bngnr72qTjrp/3TNN
Score7/10-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
-
-
Target
2bb7c2979e9372d006198745f13bf5c6.exe
-
Size
37KB
-
MD5
2bb7c2979e9372d006198745f13bf5c6
-
SHA1
1c4b3f17b3d2640976d9126fdcc42344bb2b9cf3
-
SHA256
d5673188c792f3265504fbb7fd9f01a016443b24e3f16321b92c2f8cd2781e99
-
SHA512
c8e17bc5dca8d462f96a6bfea459f6e8c73a35978e55db2f3e34b14a221595c9ba9acf27c838b906b6ae6c66afc73967d28508da0e754ec10dfe4e26ba14b46b
-
SSDEEP
384:c0bKMizdhjnBhFbJ8ycPpbfbLwCwEfrAF+rMRTyN/0L+EcoinblneHQM3epzXTNp:bbghlLJfcPpb/FwyrM+rMRa8NuNVt
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
-
-
Target
2bcc16cd37f40f56e357c814f3958491062e5be750c5c8dc9d077815d7f5461b.exe
-
Size
154KB
-
MD5
855becde69c9143a128a4c026ba5b9fd
-
SHA1
1a540c733b9418c60df6557b73eb1300e6beb6de
-
SHA256
2bcc16cd37f40f56e357c814f3958491062e5be750c5c8dc9d077815d7f5461b
-
SHA512
8f4c6cfe29fe41523e0af720339e27ffe11d3495ffffe29e7c930d2fb33be3f167778f4be867c6111b69e24e163d5c871b95c169fd052eb58ada34c00f9a9c4d
-
SSDEEP
1536:2mZmg5zb02q/t6jOFvDO7slsF9PS24s+lSmSWQWOxzlAuT2oLkC1N5UbsGt3kcmj:JZmCb6ROF96zMq1yLAHtUcmKyb
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
-
-
Target
2bf6115ff0a234d8ea278864c5abbbe6.exe
-
Size
2.0MB
-
MD5
2bf6115ff0a234d8ea278864c5abbbe6
-
SHA1
c08a5d188cb9cb7f9da54f634fe20d3b1b8c8895
-
SHA256
4ac0480a4604a1f0d3d488fc6d73d0599d0d389df241c89c62a0f574d0fbdf30
-
SHA512
880bcf6cd4b55ddba6865a49702dbde7f77194996230d7294774e6880e2b9a18be634b4cc335d52b470bffb48fd6906bb3ccb229fe3927a4c4dab94861650a6d
-
SSDEEP
49152:brYU+Yy4J8jao9UVlWAOjhRzsiYHjo++xTN:bdxVJC9UqRzsu+8N
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
-
-
Target
2bfb9d98d1176802c3f20b3ed364ccaa.exe
-
Size
101KB
-
MD5
2bfb9d98d1176802c3f20b3ed364ccaa
-
SHA1
32c0d3e97d3ab60431a9e90469fa4c954cfb798d
-
SHA256
2a85b82af04c0c36c34df09351be5f48a5d902232cdc8ad35131ab8893d55503
-
SHA512
eda3822a141787972d6f0db4230c796e691f0c44bdc45131a94e437623a93d3ea3b5a545024d13d5167c3bb3c7714f7b68aebca0ed7aea336f67b318d3a9400f
-
SSDEEP
3072:GTEWtc0/ENZTnk+1Neby+rT+wS3FDn0HqY:6u0gNebJrYhnCq
Score3/10 -
-
-
Target
2c1bb67a6359e933d609019759d98e62.exe
-
Size
229KB
-
MD5
2c1bb67a6359e933d609019759d98e62
-
SHA1
16f7c962049102dfcff4394f66adadbd666332f0
-
SHA256
7efe4f5f38f64ed942025f9960529002902130347382f93b43b63d1d1d48d5b4
-
SHA512
e43921a49bde1b25354ee5001f13f6ca11329c98b46e04aa25a4490fea33e5a9b614b612cc1bda427aadc8152736e5901a1b38ec644939724c52c6e470999414
-
SSDEEP
6144:lloZM9rIkd8g+EtXHkv/iD4WVFqoOJBi/HaIJtMfzb8e1mwTi:noZmL+EP8WVFqoOJBi/HaIJtMf2
-
Detect Umbral payload
-
Umbral family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
2c878e31cad36b4acf60c3cbde88ebe56fdb1cd5d4bab9a60508b1023d3a33a9.exe
-
Size
2.4MB
-
MD5
00ecc33d2970e267a05c9d0794bf7f15
-
SHA1
d88cbf78dfa0e934ce9966ca6d01b9ffec0e2638
-
SHA256
2c878e31cad36b4acf60c3cbde88ebe56fdb1cd5d4bab9a60508b1023d3a33a9
-
SHA512
8d8fa14305b6a7a7728adf2f7a15e7d53966a9c17fe8573732e74286a2a04f003c86c74450fa805603a5edacbf4863378b1279399dc39c6f1ad135a00e70cc61
-
SSDEEP
3072:4hTOHenMkhTOHenMkhTOHenMKdBUBXK2T3wnhTOHenMkhTOHenMKen8F9c3wpZn7:Jw4w6fVfQZ
-
Modifies boot configuration data using bcdedit
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
-
-
Target
2ccb525855c096117a4ce773ceb6afc9.exe
-
Size
6KB
-
MD5
2ccb525855c096117a4ce773ceb6afc9
-
SHA1
73511e29705b8b1c86887dc3fb5cca27fc3c274b
-
SHA256
c21b7d62a7c1d0c645a21c19d1f37b440a61bc7fd3cb4f636547d831eb135ca4
-
SHA512
6d7a2a8224f53a97885ad1f042e4b4ed284b48abc2f8bced77a2f68ecc2144957fcbf8bdafb0681cd5232df3570274d00a4564aa099c4917b4bf9781ceea65f0
-
SSDEEP
48:6teKkkpN62l9ZngmaSVfhsqdGVNMKyQPA2EXncKilUnAGq6fIxDN22/Rnm54tdfj:gt/62lf1YLhGcKpnxf+r/R/puzNt
Score1/10 -
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
3PowerShell
2Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
4