Overview
overview
10Static
static
1win.bat
windows10-1703-x64
10win_1.bat
windows10-1703-x64
10win_10.bat
windows10-1703-x64
10win_11.bat
windows10-1703-x64
10win_2.bat
windows10-1703-x64
10win_3.bat
windows10-1703-x64
10win_4.bat
windows10-1703-x64
10win_5.bat
windows10-1703-x64
10win_6.bat
windows10-1703-x64
10win_7.bat
windows10-1703-x64
10win_8.bat
windows10-1703-x64
10win_9.bat
windows10-1703-x64
10General
-
Target
kopie.zip
-
Size
6KB
-
Sample
230630-r6adlade54
-
MD5
f2a72b25cf932adaddbafa0544502734
-
SHA1
c79ee340ac659120d559a48c74c032cd8fcc9112
-
SHA256
c2fe05164b92d20e8976f4994bdea7a7e9bd4cb9f85d9dcecef9c5876a5bfd70
-
SHA512
16de5c096079fccef5da777a7de756b1fbed045955005d9368a02663e663f6945690186450723c1da034ae177d9828533d64e1ba47173dbd93b4c810d01debf9
-
SSDEEP
96:1EjC6NcEjC6NxEjC6NWEjC6NpEjC6NuEjC6NDEjC6NAEjC6NtEjC6NCEjC6NnEj2:ejXjujdjejNjUjzjKjpjAjfjS
Static task
static1
Behavioral task
behavioral1
Sample
win.bat
Resource
win10-20230621-en
Behavioral task
behavioral2
Sample
win_1.bat
Resource
win10-20230621-en
Behavioral task
behavioral3
Sample
win_10.bat
Resource
win10-20230621-en
Behavioral task
behavioral4
Sample
win_11.bat
Resource
win10-20230621-en
Behavioral task
behavioral5
Sample
win_2.bat
Resource
win10-20230621-en
Behavioral task
behavioral6
Sample
win_3.bat
Resource
win10-20230621-en
Behavioral task
behavioral7
Sample
win_4.bat
Resource
win10-20230621-en
Behavioral task
behavioral8
Sample
win_5.bat
Resource
win10-20230621-en
Behavioral task
behavioral9
Sample
win_6.bat
Resource
win10-20230621-en
Behavioral task
behavioral10
Sample
win_7.bat
Resource
win10-20230621-en
Behavioral task
behavioral11
Sample
win_8.bat
Resource
win10-20230621-en
Behavioral task
behavioral12
Sample
win_9.bat
Resource
win10-20230621-en
Malware Config
Extracted
https://github.com/rplant8/cpuminer-opt-rplant/releases/latest/download/cpuminer-opt-win.zip
Targets
-
-
Target
win.bat
-
Size
706B
-
MD5
ddc05c409f627a4382bff4c3a49423df
-
SHA1
0f77ae481593bc1b0669dae7a044d0b96f39413f
-
SHA256
6daf93d284bd5d39f613d6d3f96c083d1b99baa10e7acbf65f74ab84fe551887
-
SHA512
0bdfacc137a0f40cfffa34d3549961fe20dc35905e14a9b5c207cab380594dff09dfe641a534fb0d3211bcce3b727801df8c7c635fbc9c0cd26d6e7914818cc3
Score10/10-
Blocklisted process makes network request
-
Executes dropped EXE
-
-
-
Target
win_1.bat
-
Size
706B
-
MD5
ddc05c409f627a4382bff4c3a49423df
-
SHA1
0f77ae481593bc1b0669dae7a044d0b96f39413f
-
SHA256
6daf93d284bd5d39f613d6d3f96c083d1b99baa10e7acbf65f74ab84fe551887
-
SHA512
0bdfacc137a0f40cfffa34d3549961fe20dc35905e14a9b5c207cab380594dff09dfe641a534fb0d3211bcce3b727801df8c7c635fbc9c0cd26d6e7914818cc3
Score10/10-
Blocklisted process makes network request
-
Executes dropped EXE
-
-
-
Target
win_10.bat
-
Size
706B
-
MD5
ddc05c409f627a4382bff4c3a49423df
-
SHA1
0f77ae481593bc1b0669dae7a044d0b96f39413f
-
SHA256
6daf93d284bd5d39f613d6d3f96c083d1b99baa10e7acbf65f74ab84fe551887
-
SHA512
0bdfacc137a0f40cfffa34d3549961fe20dc35905e14a9b5c207cab380594dff09dfe641a534fb0d3211bcce3b727801df8c7c635fbc9c0cd26d6e7914818cc3
Score10/10-
Blocklisted process makes network request
-
Executes dropped EXE
-
-
-
Target
win_11.bat
-
Size
706B
-
MD5
ddc05c409f627a4382bff4c3a49423df
-
SHA1
0f77ae481593bc1b0669dae7a044d0b96f39413f
-
SHA256
6daf93d284bd5d39f613d6d3f96c083d1b99baa10e7acbf65f74ab84fe551887
-
SHA512
0bdfacc137a0f40cfffa34d3549961fe20dc35905e14a9b5c207cab380594dff09dfe641a534fb0d3211bcce3b727801df8c7c635fbc9c0cd26d6e7914818cc3
Score10/10-
Blocklisted process makes network request
-
Executes dropped EXE
-
-
-
Target
win_2.bat
-
Size
706B
-
MD5
ddc05c409f627a4382bff4c3a49423df
-
SHA1
0f77ae481593bc1b0669dae7a044d0b96f39413f
-
SHA256
6daf93d284bd5d39f613d6d3f96c083d1b99baa10e7acbf65f74ab84fe551887
-
SHA512
0bdfacc137a0f40cfffa34d3549961fe20dc35905e14a9b5c207cab380594dff09dfe641a534fb0d3211bcce3b727801df8c7c635fbc9c0cd26d6e7914818cc3
Score10/10-
Blocklisted process makes network request
-
Executes dropped EXE
-
-
-
Target
win_3.bat
-
Size
706B
-
MD5
ddc05c409f627a4382bff4c3a49423df
-
SHA1
0f77ae481593bc1b0669dae7a044d0b96f39413f
-
SHA256
6daf93d284bd5d39f613d6d3f96c083d1b99baa10e7acbf65f74ab84fe551887
-
SHA512
0bdfacc137a0f40cfffa34d3549961fe20dc35905e14a9b5c207cab380594dff09dfe641a534fb0d3211bcce3b727801df8c7c635fbc9c0cd26d6e7914818cc3
Score10/10-
Blocklisted process makes network request
-
Executes dropped EXE
-
-
-
Target
win_4.bat
-
Size
706B
-
MD5
ddc05c409f627a4382bff4c3a49423df
-
SHA1
0f77ae481593bc1b0669dae7a044d0b96f39413f
-
SHA256
6daf93d284bd5d39f613d6d3f96c083d1b99baa10e7acbf65f74ab84fe551887
-
SHA512
0bdfacc137a0f40cfffa34d3549961fe20dc35905e14a9b5c207cab380594dff09dfe641a534fb0d3211bcce3b727801df8c7c635fbc9c0cd26d6e7914818cc3
Score10/10-
Blocklisted process makes network request
-
Executes dropped EXE
-
-
-
Target
win_5.bat
-
Size
706B
-
MD5
ddc05c409f627a4382bff4c3a49423df
-
SHA1
0f77ae481593bc1b0669dae7a044d0b96f39413f
-
SHA256
6daf93d284bd5d39f613d6d3f96c083d1b99baa10e7acbf65f74ab84fe551887
-
SHA512
0bdfacc137a0f40cfffa34d3549961fe20dc35905e14a9b5c207cab380594dff09dfe641a534fb0d3211bcce3b727801df8c7c635fbc9c0cd26d6e7914818cc3
Score10/10-
Blocklisted process makes network request
-
Executes dropped EXE
-
-
-
Target
win_6.bat
-
Size
706B
-
MD5
ddc05c409f627a4382bff4c3a49423df
-
SHA1
0f77ae481593bc1b0669dae7a044d0b96f39413f
-
SHA256
6daf93d284bd5d39f613d6d3f96c083d1b99baa10e7acbf65f74ab84fe551887
-
SHA512
0bdfacc137a0f40cfffa34d3549961fe20dc35905e14a9b5c207cab380594dff09dfe641a534fb0d3211bcce3b727801df8c7c635fbc9c0cd26d6e7914818cc3
Score10/10-
Blocklisted process makes network request
-
-
-
Target
win_7.bat
-
Size
706B
-
MD5
ddc05c409f627a4382bff4c3a49423df
-
SHA1
0f77ae481593bc1b0669dae7a044d0b96f39413f
-
SHA256
6daf93d284bd5d39f613d6d3f96c083d1b99baa10e7acbf65f74ab84fe551887
-
SHA512
0bdfacc137a0f40cfffa34d3549961fe20dc35905e14a9b5c207cab380594dff09dfe641a534fb0d3211bcce3b727801df8c7c635fbc9c0cd26d6e7914818cc3
Score10/10-
Blocklisted process makes network request
-
Executes dropped EXE
-
-
-
Target
win_8.bat
-
Size
706B
-
MD5
ddc05c409f627a4382bff4c3a49423df
-
SHA1
0f77ae481593bc1b0669dae7a044d0b96f39413f
-
SHA256
6daf93d284bd5d39f613d6d3f96c083d1b99baa10e7acbf65f74ab84fe551887
-
SHA512
0bdfacc137a0f40cfffa34d3549961fe20dc35905e14a9b5c207cab380594dff09dfe641a534fb0d3211bcce3b727801df8c7c635fbc9c0cd26d6e7914818cc3
Score10/10-
Blocklisted process makes network request
-
Executes dropped EXE
-
-
-
Target
win_9.bat
-
Size
706B
-
MD5
ddc05c409f627a4382bff4c3a49423df
-
SHA1
0f77ae481593bc1b0669dae7a044d0b96f39413f
-
SHA256
6daf93d284bd5d39f613d6d3f96c083d1b99baa10e7acbf65f74ab84fe551887
-
SHA512
0bdfacc137a0f40cfffa34d3549961fe20dc35905e14a9b5c207cab380594dff09dfe641a534fb0d3211bcce3b727801df8c7c635fbc9c0cd26d6e7914818cc3
Score10/10-
Blocklisted process makes network request
-
Executes dropped EXE
-