General
-
Target
ReadMe.cmd
-
Size
18KB
-
Sample
220725-bcqwgsgdfl
-
MD5
9604df2bffd72ef6202287cf4f00ba9e
-
SHA1
a4e5f57b19e3afe88843dd1a41cdd1eee82f0fee
-
SHA256
d01226b2f65505ea6fd98deaa92f3d48e50457e0264e4c636b71d53001eee048
-
SHA512
d5c09ed8fac89aafb2f7b28732c802c88ac005437213633a671d79c0250ec662e46c96ed1b13312546d775b10e9885a16222cd8e379b516b5b2c4496e653ef58
Static task
static1
Behavioral task
behavioral1
Sample
ReadMe.cmd
Resource
win10v2004-20220721-en
Malware Config
Targets
-
-
Target
ReadMe.cmd
-
Size
18KB
-
MD5
9604df2bffd72ef6202287cf4f00ba9e
-
SHA1
a4e5f57b19e3afe88843dd1a41cdd1eee82f0fee
-
SHA256
d01226b2f65505ea6fd98deaa92f3d48e50457e0264e4c636b71d53001eee048
-
SHA512
d5c09ed8fac89aafb2f7b28732c802c88ac005437213633a671d79c0250ec662e46c96ed1b13312546d775b10e9885a16222cd8e379b516b5b2c4496e653ef58
Score10/10-
suricata: ET MALWARE Windows TaskList Microsoft Windows DOS prompt command exit OUTBOUND
suricata: ET MALWARE Windows TaskList Microsoft Windows DOS prompt command exit OUTBOUND
-
Blocklisted process makes network request
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-