HackTool.PS1.PowerView.SM
2024年5月9日
別名:
PowerShell/RiskWare.PowerSploit.BU application (NOD32)
プラットフォーム:
Windows
危険度:
ダメージ度:
感染力:
感染確認数:
情報漏えい:

マルウェアタイプ:
ハッキングツール
破壊活動の有無:
なし
暗号化:
感染報告の有無 :
はい
概要
感染経路 インターネットからのダウンロード, 他のマルウェアからの作成
プログラムは、他のマルウェアに作成されるか、悪意あるWebサイトからユーザが誤ってダウンロードすることによりコンピュータに侵入します。
詳細
ファイルサイズ 472,470 bytes
メモリ常駐 なし
発見日 2024年4月19日
侵入方法
プログラムは、他のマルウェアに作成されるか、悪意あるWebサイトからユーザが誤ってダウンロードすることによりコンピュータに侵入します。
その他
プログラムは、以下を実行します。
- It accepts the following commands and actions:
- Export-PowerViewCSV → thread-safe CSV append
- Resolve-IPAddress → resolves a hostname to an IP
- ConvertTo-SID → converts a given user/group name to a security identifier (SID)
- Convert-ADName → converts object names between a variety of formats
- ConvertFrom-UACValue → converts a UAC int value to human readable form
- Add-RemoteConnection → pseudo "mounts" a connection to a remote path using the specified credential object
- Remove-RemoteConnection → destroys a connection created by New-RemoteConnection
- Invoke-UserImpersonation → creates a new "runas /netonly" type logon and impersonates the token
- Invoke-RevertToSelf → reverts any token impersonation
- Get-DomainSPNTicket → request the kerberos ticket for a specified service principal name (SPN)
- Invoke-Kerberoast → requests service tickets for kerberoast-able accounts and returns extracted ticket hashes
- Get-PathAcl → get the ACLs for a local/remote file path with optional group recursion
- Get-DomainDNSZone → enumerates the Active Directory DNS zones for a given domain
- Get-DomainDNSRecord → enumerates the Active Directory DNS records for a given zone
- Get-Domain → returns the domain object for the current (or specified) domain
- Get-DomainController → return the domain controllers for the current (or specified) domain
- Get-Forest → returns the forest object for the current (or specified) forest
- Get-ForestDomain → return all domains for the current (or specified) forest
- Get-ForestGlobalCatalog → return all global catalogs for the current (or specified) forest
- Find-DomainObjectPropertyOutlier → inds user/group/computer objects in AD that have 'outlier' properties set
- Get-DomainUser → return all users or specific user objects in AD
- New-DomainUser → creates a new domain user (assuming appropriate permissions) and returns the user object
- Set-DomainUserPassword → sets the password for a given user identity and returns the user object
- Get-DomainUserEvent → enumerates account logon events (ID 4624) and Logon with explicit credential events
- Get-DomainComputer → returns all computers or specific computer objects in AD
- Get-DomainObject → returns all (or specified) domain objects in AD
- Set-DomainObject → modifies a gven property for a specified active directory object
- Get-DomainObjectAcl → returns the ACLs associated with a specific active directory object
- Add-DomainObjectAcl → adds an ACL for a specific active directory object
- Find-InterestingDomainAcl → finds object ACLs in the current (or specified) domain with modification rights set to non-built in objects
- Get-DomainOU → search for all organization units (OUs) or specific OU objects in AD
- Get-DomainSite → search for all sites or specific site objects in AD
- Get-DomainSubnet → search for all subnets or specific subnets objects in AD
- Get-DomainSID → returns the SID for the current domain or the specified domain
- Get-DomainGroup → return all groups or specific group objects in AD
- New-DomainGroup → creates a new domain group (assuming appropriate permissions) and returns the group object
- Get-DomainManagedSecurityGroup → returns all security groups in the current (or target) domain that have a manager set
- Get-DomainGroupMember → return the members of a specific domain group
- Add-DomainGroupMember → adds a domain user (or group) to an existing domain group, assuming appropriate permissions to do so
- Get-DomainFileServer → returns a list of servers likely functioning as file servers
- Get-DomainDFSShare → returns a list of all fault-tolerant distributed file systems for the current (or specified) domain
- Get-NetLocalGroup → enumerates the local groups on the local (or remote) machine
- Get-NetLocalGroupMember → enumerates members of a specific local group on the local (or remote) machine
- Get-NetShare → returns open shares on the local (or a remote) machine
- Get-NetLoggedon → returns users logged on the local (or a remote) machine
- Get-NetSession → returns session information for the local (or a remote) machine
- Get-RegLoggedOn → returns who is logged onto the local (or a remote) machine through enumeration of remote registry keys
- Get-NetRDPSession → returns remote desktop/session information for the local (or a remote) machine
- Test-AdminAccess → rests if the current user has administrative access to the local (or a remote) machine
- Get-NetComputerSiteName → returns the AD site where the local (or a remote) machine resides
- Get-WMIRegProxy → enumerates the proxy server and WPAD conents for the current user
- Get-WMIRegLastLoggedOn → returns the last user who logged onto the local (or a remote) machine
- Get-WMIRegCachedRDPConnection → returns information about RDP connections outgoing from the local (or remote) machine
- Get-WMIRegMountedDrive → returns information about saved network mounted drives for the local (or remote) machine
- Get-WMIProcess → returns a list of processes and their owners on the local or remote machine
- Find-InterestingFile → searches for files on the given path that match a series of specified criteria
- Find-DomainUserLocation → finds domain machines where specific users are logged into
- Find-DomainProcess → finds domain machines where specific processes are currently running
- Find-DomainUserEvent → finds logon events on the current (or remote domain) for the specified users
- Find-DomainShare → finds reachable shares on domain machines
- Find-InterestingDomainShareFile → searches for files matching specific criteria on readable shares in the domain
- Find-LocalAdminAccess → finds machines on the local domain where the current user has local administrator access
- Find-DomainLocalGroupMember → enumerates the members of specified local group on machines in the domain
- Get-DomainTrust → returns all domain trusts for the current domain or a specified domain
- Get-ForestTrust → returns all forest trusts for the current forest or a specified forest
- Get-DomainForeignUser → enumerates users who are in groups outside of the user's domain
- Get-DomainForeignGroupMember → enumerates groups with users outside of the group's domain and returns each foreign member
- Get-DomainTrustMapping → this function enumerates all trusts for the current domain and then enumerates all trusts for each domain it finds
対応方法
対応検索エンジン: 9.800
SSAPI パターンバージョン: 2.723.00
SSAPI パターンリリース日: 2024年5月2日
手順 1
Windows 7、Windows 8、Windows 8.1、および Windows 10 のユーザは、コンピュータからマルウェアもしくはアドウェア等を完全に削除するために、ウイルス検索の実行前には必ず「システムの復元」を無効にしてください。
手順 2
最新のバージョン(エンジン、パターンファイル)を導入したウイルス対策製品を用い、ウイルス検索を実行してください。「HackTool.PS1.PowerView.SM」と検出したファイルはすべて削除してください。 検出されたファイルが、弊社ウイルス対策製品により既に駆除、隔離またはファイル削除の処理が実行された場合、ウイルスの処理は完了しており、他の削除手順は特にありません。
ご利用はいかがでしたか? アンケートにご協力ください