General

  • Target

    2.bat

  • Size

    778B

  • Sample

    230818-dkrh4afa78

  • MD5

    a33d8f86256aa8f7a8cb7d42707ee267

  • SHA1

    cda0d5614da462696a56f164cd091c01caa6b01b

  • SHA256

    91d4f69edd266840e549e4470edb9c51289abf84c7f7e4ef22ce157c75932112

  • SHA512

    e733a716b5e04fc97ca4c46b866b7ce21b9a9b27f7d2e6c7a4097b314a5f8bc883598f70026ff530a46b3f2d9439bc2154fc8d5ec746c0339e75b9c1c5ae3d85

Score
9/10

Malware Config

Targets

    • Target

      2.bat

    • Size

      778B

    • MD5

      a33d8f86256aa8f7a8cb7d42707ee267

    • SHA1

      cda0d5614da462696a56f164cd091c01caa6b01b

    • SHA256

      91d4f69edd266840e549e4470edb9c51289abf84c7f7e4ef22ce157c75932112

    • SHA512

      e733a716b5e04fc97ca4c46b866b7ce21b9a9b27f7d2e6c7a4097b314a5f8bc883598f70026ff530a46b3f2d9439bc2154fc8d5ec746c0339e75b9c1c5ae3d85

    Score
    9/10
    • Contacts a large (7961) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks