General
-
Target
Virus.bat
-
Size
568B
-
Sample
231021-zd7gmabf62
-
MD5
acecd257f02e34d3bf496ca958b43c8b
-
SHA1
652936e405caec5c43757db7dfe9b7e29b6cbd96
-
SHA256
9745c4e2e22b15140e324dd59785803f72d04cb627cdc66fe3548c642576ec61
-
SHA512
126a8ec4a659726083a028e075c8e7a0402ab6924b1333707d4a74c7629a18375e3cb727acf5023ebd095487c80732a128e890a9fa8debc6c551c23711bd28c7
Static task
static1
Behavioral task
behavioral1
Sample
Virus.bat
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
Virus.bat
Resource
win10v2004-20231020-en
Malware Config
Targets
-
-
Target
Virus.bat
-
Size
568B
-
MD5
acecd257f02e34d3bf496ca958b43c8b
-
SHA1
652936e405caec5c43757db7dfe9b7e29b6cbd96
-
SHA256
9745c4e2e22b15140e324dd59785803f72d04cb627cdc66fe3548c642576ec61
-
SHA512
126a8ec4a659726083a028e075c8e7a0402ab6924b1333707d4a74c7629a18375e3cb727acf5023ebd095487c80732a128e890a9fa8debc6c551c23711bd28c7
Score8/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-