General

  • Target

    2.bat

  • Size

    917B

  • Sample

    230818-w3e7wsec5y

  • MD5

    c83af19fcf6fd4919327991ca7f38fee

  • SHA1

    daab8761b448083f6ff7a71a173120ebef637efe

  • SHA256

    ae3f46c16eabaaebf0b54c7380a58499c390dfcd8ee5fedec878d7bbfb6a7a01

  • SHA512

    3166984303fcd700c6c1bd8f612dc4e473104fdea03a5527ba171f581b58b1ef988ad7d990282046ceb2f8d0c4ad2be1ac8c7504cf61de4c7c63a72e7816bfb3

Score
8/10

Malware Config

Targets

    • Target

      2.bat

    • Size

      917B

    • MD5

      c83af19fcf6fd4919327991ca7f38fee

    • SHA1

      daab8761b448083f6ff7a71a173120ebef637efe

    • SHA256

      ae3f46c16eabaaebf0b54c7380a58499c390dfcd8ee5fedec878d7bbfb6a7a01

    • SHA512

      3166984303fcd700c6c1bd8f612dc4e473104fdea03a5527ba171f581b58b1ef988ad7d990282046ceb2f8d0c4ad2be1ac8c7504cf61de4c7c63a72e7816bfb3

    Score
    8/10
    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks