PS1

Malware updated 3 days ago (2024-10-15T10:01:26.360Z)
Download STIX
Preview STIX
PS1 is a type of malware, similar to a VBS file, that communicates with a remote server. However, unlike the VBS file, the PS1 file uses DNS instead of HTTP to establish this communication. This malicious software is designed to run PowerShell commands via a PS1 file and retrieve output. The malware is capable of exploiting and damaging computer systems or devices, often through suspicious downloads, emails, or websites. Once infiltrated, it can steal personal information, disrupt operations, or even hold data for ransom. There are slight differences between the dns, fireeye, and komisova PS1 variants as discussed in our previous OilRig blog post. A notable concern is that meterpreter payloads seem incompatible with CVE-2021-42847, making it unlikely that the ps1 script can be automatically removed. Therefore, manual cleanup is necessary, especially for the ps1 script from /alert_scripts/ in the ManageEngine ADAudit Plus install directory. Furthermore, an array of files with different extensions including but not limited to .ndoc, .docx, .xls, .xlsx, .ppt, .pptx, .pst, .ost, .msg, .eml, .vsd, .vsdx, .txt, .csv, .rtf, .wks, .wk1, .pdf, .dwg, .onetoc2, .snt, .jpeg, .jpg, .docb, .docm, .dot, .dotm, .dotx, .xlsm, .xlsb, .xlw, .xlt, .xlm, .xlc, .xltx, .xltm, .pptm, .pot, .pps, .ppsm, .ppsx, .ppam, .potx, .potm, .edb, .hwp, .602, .sxi, .sti, .sldx, .sldm, .sldm, .vdi, .vmdk, .vmx, .gpg, .aes, .ARC, .PAQ, .bz2, .tbk, .bak, .tar, .tgz, .gz, .7z, .rar, .zip, .backup, .iso, .vcd, .bmp, .png, .gif, .raw, .cgm, .tif, .tiff, .nef, .psd, .ai, .svg, .djvu, .m4u, .m3u, .mid, .wma, .flv, .3g2, .mkv, .3gp, .mp4, .mov, .avi, .asf, .mpeg, .vob, .mpg, .wmv, .fla, .swf, .wav, .mp3, .sh, .class, .jar, .java, .rb, .asp, .php, .jsp, .brd, .sch, .dch, .dip, .pl, .vb, .vbs, .bat, .cmd, .js, .asm, .h, .pas, .cpp, .c, .cs, .suo, .sln, .ldf, .mdf, .ibd, .myi, .myd, .frm, .odb, .dbf, .db, .mdb, .accdb, .sql, .sqlitedb, .sqlite3, .asc, .lay6, .lay, .mml, .sxm, .otg, .odg, .uop, .std, .sxd, .otp, .odp, .wb2, .slk, .dif, .stc, .sxc, .ots, .ods, .3dm, .max, .3ds, .uot, .stw, .sxw, .ott, .odt, .pem, .p12, .csr, .crt, .key, .pfx, .der, .dat are being attacked. The PS1 malware employs two strong encryption algorithms, Salsa20 and a key randomly generated using RtlRandomEx. It begins its attack by repairing gaming consoles such as the Dreamcast, Xbox, and PS1, then learning how to mod them. On the computer side, it starts with learning about CD burners and gradually infiltrates deeper into the system. The malware ignores certain file extensions during its operation, including but not limited to .386, .adv, .ani, .bat, .bin, .cab, .cmd, .com, .cpl, .cur, .deskthemepack, .diagcab, .diagcfg, .diagpkg, .dll, .drv,
Description last updated: 2024-10-15T09:25:00.828Z
What's your take? (Question 1 of 3)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
PowerShell
Ics
Windows
Ransomware
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the PS1 Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more