General
-
Target
d.bat
-
Size
2KB
-
Sample
230930-eagrksge2z
-
MD5
c2ebfe4a667924b494eb94be7cd59cc6
-
SHA1
abec4e7cff97cc18a8fadf73da1f7e0bdfb78fc5
-
SHA256
28f3b13baecb52f06e87be16fe33238797dd18640950f8c2b7cd1ae92f5e3e9e
-
SHA512
85dd961b47e81ddd57ce2478b8f9fa450d157bebf003835115866c8f2728856f9088d4be69907beee080367b0ec7f713b2d73e84a7154775c7068ccafce0ed3c
Static task
static1
Behavioral task
behavioral1
Sample
d.bat
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
d.bat
-
Size
2KB
-
MD5
c2ebfe4a667924b494eb94be7cd59cc6
-
SHA1
abec4e7cff97cc18a8fadf73da1f7e0bdfb78fc5
-
SHA256
28f3b13baecb52f06e87be16fe33238797dd18640950f8c2b7cd1ae92f5e3e9e
-
SHA512
85dd961b47e81ddd57ce2478b8f9fa450d157bebf003835115866c8f2728856f9088d4be69907beee080367b0ec7f713b2d73e84a7154775c7068ccafce0ed3c
Score8/10-
Modifies Installed Components in the registry
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2