解析者: Raymart Christian Yambot   

 別名:

PowerShell/RiskWare.PowerSploit.BU application (NOD32)

 プラットフォーム:

Windows

 危険度:
 ダメージ度:
 感染力:
 感染確認数:
 情報漏えい:

  • マルウェアタイプ:
    ハッキングツール

  • 破壊活動の有無:
    なし

  • 暗号化:
     

  • 感染報告の有無 :
    はい

  概要

感染経路 インターネットからのダウンロード, 他のマルウェアからの作成

プログラムは、他のマルウェアに作成されるか、悪意あるWebサイトからユーザが誤ってダウンロードすることによりコンピュータに侵入します。

  詳細

ファイルサイズ 472,400 bytes
タイプ PS1
メモリ常駐 なし
発見日 2024年4月19日

侵入方法

プログラムは、他のマルウェアに作成されるか、悪意あるWebサイトからユーザが誤ってダウンロードすることによりコンピュータに侵入します。

その他

プログラムは、以下を実行します。

  • It accepts the following commands and actions:
    • Export-PowerViewCSV → thread-safe CSV append
    • Resolve-IPAddress → resolves a hostname to an IP
    • ConvertTo-SID → converts a given user/group name to a security identifier (SID)
    • Convert-ADName → converts object names between a variety of formats
    • ConvertFrom-UACValue → converts a UAC int value to human readable form
    • Add-RemoteConnection → pseudo "mounts" a connection to a remote path using the specified credential object
    • Remove-RemoteConnection → destroys a connection created by New-RemoteConnection
    • Invoke-UserImpersonation → creates a new "runas /netonly" type logon and impersonates the token
    • Invoke-RevertToSelf → reverts any token impersonation
    • Get-DomainSPNTicket → request the kerberos ticket for a specified service principal name (SPN)
    • Invoke-Kerberoast → requests service tickets for kerberoast-able accounts and returns extracted ticket hashes
    • Get-PathAcl → get the ACLs for a local/remote file path with optional group recursion
    • Get-DomainDNSZone → enumerates the Active Directory DNS zones for a given domain
    • Get-DomainDNSRecord → enumerates the Active Directory DNS records for a given zone
    • Get-Domain → returns the domain object for the current (or specified) domain
    • Get-DomainController → return the domain controllers for the current (or specified) domain
    • Get-Forest → returns the forest object for the current (or specified) forest
    • Get-ForestDomain → return all domains for the current (or specified) forest
    • Get-ForestGlobalCatalog → return all global catalogs for the current (or specified) forest
    • Find-DomainObjectPropertyOutlier → inds user/group/computer objects in AD that have 'outlier' properties set
    • Get-DomainUser → return all users or specific user objects in AD
    • New-DomainUser → creates a new domain user (assuming appropriate permissions) and returns the user object
    • Set-DomainUserPassword → sets the password for a given user identity and returns the user object
    • Get-DomainUserEvent → enumerates account logon events (ID 4624) and Logon with explicit credential events
    • Get-DomainComputer → returns all computers or specific computer objects in AD
    • Get-DomainObject → returns all (or specified) domain objects in AD
    • Set-DomainObject → modifies a gven property for a specified active directory object
    • Get-DomainObjectAcl → returns the ACLs associated with a specific active directory object
    • Add-DomainObjectAcl → adds an ACL for a specific active directory object
    • Find-InterestingDomainAcl → finds object ACLs in the current (or specified) domain with modification rights set to non-built in objects
    • Get-DomainOU → search for all organization units (OUs) or specific OU objects in AD
    • Get-DomainSite → search for all sites or specific site objects in AD
    • Get-DomainSubnet → search for all subnets or specific subnets objects in AD
    • Get-DomainSID → returns the SID for the current domain or the specified domain
    • Get-DomainGroup → return all groups or specific group objects in AD
    • New-DomainGroup → creates a new domain group (assuming appropriate permissions) and returns the group object
    • Get-DomainManagedSecurityGroup → returns all security groups in the current (or target) domain that have a manager set
    • Get-DomainGroupMember → return the members of a specific domain group
    • Add-DomainGroupMember → adds a domain user (or group) to an existing domain group, assuming appropriate permissions to do so
    • Get-DomainFileServer → returns a list of servers likely functioning as file servers
    • Get-DomainDFSShare → returns a list of all fault-tolerant distributed file systems for the current (or specified) domain
    • Get-NetLocalGroup → enumerates the local groups on the local (or remote) machine
    • Get-NetLocalGroupMember → enumerates members of a specific local group on the local (or remote) machine
    • Get-NetShare → returns open shares on the local (or a remote) machine
    • Get-NetLoggedon → returns users logged on the local (or a remote) machine
    • Get-NetSession → returns session information for the local (or a remote) machine
    • Get-RegLoggedOn → returns who is logged onto the local (or a remote) machine through enumeration of remote registry keys
    • Get-NetRDPSession → returns remote desktop/session information for the local (or a remote) machine
    • Test-AdminAccess → rests if the current user has administrative access to the local (or a remote) machine
    • Get-NetComputerSiteName → returns the AD site where the local (or a remote) machine resides
    • Get-WMIRegProxy → enumerates the proxy server and WPAD conents for the current user
    • Get-WMIRegLastLoggedOn → returns the last user who logged onto the local (or a remote) machine
    • Get-WMIRegCachedRDPConnection → returns information about RDP connections outgoing from the local (or remote) machine
    • Get-WMIRegMountedDrive → returns information about saved network mounted drives for the local (or remote) machine
    • Get-WMIProcess → returns a list of processes and their owners on the local or remote machine
    • Find-InterestingFile → searches for files on the given path that match a series of specified criteria
    • Find-DomainUserLocation → finds domain machines where specific users are logged into
    • Find-DomainProcess → finds domain machines where specific processes are currently running
    • Find-DomainUserEvent → finds logon events on the current (or remote domain) for the specified users
    • Find-DomainShare → finds reachable shares on domain machines
    • Find-InterestingDomainShareFile → searches for files matching specific criteria on readable shares in the domain
    • Find-LocalAdminAccess → finds machines on the local domain where the current user has local administrator access
    • Find-DomainLocalGroupMember → enumerates the members of specified local group on machines in the domain
    • Get-DomainTrust → returns all domain trusts for the current domain or a specified domain
    • Get-ForestTrust → returns all forest trusts for the current forest or a specified forest
    • Get-DomainForeignUser → enumerates users who are in groups outside of the user's domain
    • Get-DomainForeignGroupMember → enumerates groups with users outside of the group's domain and returns each foreign member
    • Get-DomainTrustMapping → this function enumerates all trusts for the current domain and then enumerates all trusts for each domain it finds

  対応方法

対応検索エンジン: 9.800
SSAPI パターンバージョン: 2.722.00
SSAPI パターンリリース日: 2024年4月25日

手順 1

Windows 7、Windows 8、Windows 8.1、および Windows 10 のユーザは、コンピュータからマルウェアもしくはアドウェア等を完全に削除するために、ウイルス検索の実行前には必ず「システムの復元」を無効にしてください。

手順 2

最新のバージョン(エンジン、パターンファイル)を導入したウイルス対策製品を用い、ウイルス検索を実行してください。「HackTool.PS1.PowerView.D」と検出したファイルはすべて削除してください。 検出されたファイルが、弊社ウイルス対策製品により既に駆除、隔離またはファイル削除の処理が実行された場合、ウイルスの処理は完了しており、他の削除手順は特にありません。


ご利用はいかがでしたか? アンケートにご協力ください