General

  • Target

    2.bat

  • Size

    779B

  • Sample

    230818-atrzfaec95

  • MD5

    f80b95d6836f18d936105783c4e2c186

  • SHA1

    b95ee9d9ea1d9df6d5dc16ffb400f34a497823a6

  • SHA256

    ad80a704ac0ce9868279a0a3d4e85a2582aff13a9e24a0b46478800fa341b260

  • SHA512

    c50803b213cda537b254633ad48c70bff055b04fdb99829e898d2c7626a24d018709b35dc92f1e89b217f9bb6efafbd2e5074a32e307a89830b8453b4bee1291

Score
9/10

Malware Config

Targets

    • Target

      2.bat

    • Size

      779B

    • MD5

      f80b95d6836f18d936105783c4e2c186

    • SHA1

      b95ee9d9ea1d9df6d5dc16ffb400f34a497823a6

    • SHA256

      ad80a704ac0ce9868279a0a3d4e85a2582aff13a9e24a0b46478800fa341b260

    • SHA512

      c50803b213cda537b254633ad48c70bff055b04fdb99829e898d2c7626a24d018709b35dc92f1e89b217f9bb6efafbd2e5074a32e307a89830b8453b4bee1291

    Score
    9/10
    • Contacts a large (7966) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks