General

  • Target

    Uni.bat

  • Size

    13.7MB

  • Sample

    230609-awpl4aae52

  • MD5

    b4af2b864bf888de22d881153db8656c

  • SHA1

    d81d8e0f688fed1ba7d5330a78bff1a164e38a91

  • SHA256

    81bb54b820256701252aee3fec35442448d9c411c64f750e81092e778756085f

  • SHA512

    6258fc12b5a6d46eaf2a8892481d6e916d3d377ca130c7b666e72169172661acb69bd9c7a946a46d927a4303b446205c8d39df2954aea54ca58dd183d21a3df0

  • SSDEEP

    49152:ixQ4rUTJQMGse7XJdh/8LImbFWHyQUQQSrCl6YY8hzRXEO0CEDo1YDZmT6EA6ogS:c

Score
10/10

Malware Config

Targets

    • Target

      Uni.bat

    • Size

      13.7MB

    • MD5

      b4af2b864bf888de22d881153db8656c

    • SHA1

      d81d8e0f688fed1ba7d5330a78bff1a164e38a91

    • SHA256

      81bb54b820256701252aee3fec35442448d9c411c64f750e81092e778756085f

    • SHA512

      6258fc12b5a6d46eaf2a8892481d6e916d3d377ca130c7b666e72169172661acb69bd9c7a946a46d927a4303b446205c8d39df2954aea54ca58dd183d21a3df0

    • SSDEEP

      49152:ixQ4rUTJQMGse7XJdh/8LImbFWHyQUQQSrCl6YY8hzRXEO0CEDo1YDZmT6EA6ogS:c

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks