General
-
Target
Vanity-SS5.0____.bat
-
Size
19KB
-
Sample
230824-qc3mlscf83
-
MD5
46cbbe78ca15fff3981559b18680006d
-
SHA1
5b959fcfff6ccab37f0aec76e9cdfef0ae98379a
-
SHA256
a06a07083be4dd1bcb28e2b9b0c412da9cbb79842a44608328c8376137370e6f
-
SHA512
3edb6df26ee3f8c4a078aa19b9f9987ae5b4c78802e8a620fe3e5f28301762400fb8c133ef7dcf3c8505563f0e68c556b8a3221429bb97a70b77115e47492e42
-
SSDEEP
192:P8FJwymTZj309XKav87jffaQT2Nfk2UfxWqWcWvdWekPhZn:tj09XKaAmkPn
Static task
static1
Behavioral task
behavioral1
Sample
Vanity-SS5.0____.bat
Resource
win10v2004-20230703-en
Malware Config
Targets
-
-
Target
Vanity-SS5.0____.bat
-
Size
19KB
-
MD5
46cbbe78ca15fff3981559b18680006d
-
SHA1
5b959fcfff6ccab37f0aec76e9cdfef0ae98379a
-
SHA256
a06a07083be4dd1bcb28e2b9b0c412da9cbb79842a44608328c8376137370e6f
-
SHA512
3edb6df26ee3f8c4a078aa19b9f9987ae5b4c78802e8a620fe3e5f28301762400fb8c133ef7dcf3c8505563f0e68c556b8a3221429bb97a70b77115e47492e42
-
SSDEEP
192:P8FJwymTZj309XKav87jffaQT2Nfk2UfxWqWcWvdWekPhZn:tj09XKaAmkPn
Score8/10-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-