- Feb 7, 2023
- 3,415
- 21,989
- 4,379
The analysis and play with McAfee continues. Today's work reveals that McAfee is using memory content scan: it is capable of scanning the underlying process code, as opposed to just getting the image path and scanning it on disk.
Some of these threats were taken from real attacks and copy-pasted in PowerShell. Others have extremely low VT detection.
Some of these threats were taken from real attacks and copy-pasted in PowerShell. Others have extremely low VT detection.
Field | Value | ||
Timestamp(s) | 7:05 PM, 7:14 PM, 7:15 PM | ||
Action Taken | ![]() | ||
Target | [memory] PowerShell.exe | ||
SHA256 Hash | N/A (Memory Scan) | ||
TLSH | N/A | ||
Key Engines | rp-fileless (50, 50, 45), neo (50, 50, 1) |
Field | Value | ||||
Timestamp | 2025-07-28 at 7:11:45 PM BST | ||||
Action Taken | ![]() | ||||
Target | C:\...\aspnet_compiler.exe | ||||
SHA256 Hash | 923c541ce782bf45a3d338487e6f411cd11ab0b98eb9775a2d2065dff39a4f37 | ||||
TLSH | Not Provided | ||||
Engines | rp-d (1), cache (99) |
Field | Value | ||||
Timestamp | 2025-07-28 at 7:18:02 PM BST | ||||
Action Taken | ![]() | ||||
Target | C:\...\certutil.exe | ||||
SHA256 Hash | 0693b1964ce3e578d61cbe1d7dec28737cad29147d89fe6fe537dd591a0a68bb | ||||
TLSH | Not Provided | ||||
Engines | rp-d (1), cache (99) |
Field | Value | ||||
Timestamp | 2025-07-28 at 7:18:05 PM BST | ||||
Action Taken | ![]() | ||||
Target | C:\Users\user\AppData\Local\Temp\pipe\XORLoader.ps1 | ||||
SHA256 Hash | b9b34908dd298d8a43b2306f81370bf9af0c9e49a8c33110b021f2739c0b58b2 | ||||
TLSH | Not Provided | ||||
Engines | signature (50), av (50), neo (50) |