General

  • Target

    LOL_checker.bat

  • Size

    13.5MB

  • Sample

    230502-jnqzmaca4s

  • MD5

    f7863fbcae244fa731b8b7d1e29bfb83

  • SHA1

    44f01e8ad60e9f8c9830e256af0cab44796a0c06

  • SHA256

    a0f43c5748ada07a12af81dda2460045030f936a8d5081f3a403f85c2a9668f8

  • SHA512

    2f28b3d2d6bf51d0bac1aae84114bfcfc99218a0310c7ac95c8e34a04efe3f1fd37821b566483099e47ea693fa453290cfa82393bae48dfdfd933bbc34db0a8c

  • SSDEEP

    49152:xn+XTjaklourM+8cnw+LP8HLTbQuUftwWx/njk4HI/GyIAGrtVtbsuhpcy8Jl5sl:O

Score
10/10

Malware Config

Targets

    • Target

      LOL_checker.bat

    • Size

      13.5MB

    • MD5

      f7863fbcae244fa731b8b7d1e29bfb83

    • SHA1

      44f01e8ad60e9f8c9830e256af0cab44796a0c06

    • SHA256

      a0f43c5748ada07a12af81dda2460045030f936a8d5081f3a403f85c2a9668f8

    • SHA512

      2f28b3d2d6bf51d0bac1aae84114bfcfc99218a0310c7ac95c8e34a04efe3f1fd37821b566483099e47ea693fa453290cfa82393bae48dfdfd933bbc34db0a8c

    • SSDEEP

      49152:xn+XTjaklourM+8cnw+LP8HLTbQuUftwWx/njk4HI/GyIAGrtVtbsuhpcy8Jl5sl:O

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks