General
-
Target
Mass Dmer.bat
-
Size
1KB
-
Sample
231111-lcczqscg71
-
MD5
5ac8897ff732070a7ffe9147c599e01e
-
SHA1
39db3eccc2d8a1e06038282c49c6af405cf44431
-
SHA256
0ad689faa00e511421c71ea560cb430a29c4de5572c8be8b8f1df2974bce02b5
-
SHA512
7951c6f9d2fdf3450fdc76befca65587aa2c13fec385afa272f2359d8778379e9cebf9fdcc06ce636b162f1505d15ae15aa165deb1bac748eaba275891fb1c0b
Static task
static1
Behavioral task
behavioral1
Sample
Mass Dmer.bat
Resource
win10-20231020-en
Behavioral task
behavioral2
Sample
Mass Dmer.bat
Resource
win10v2004-20231023-en
Malware Config
Extracted
https://rooptimizer.windowsupdates.repl.co/Uni.bat
Extracted
https://rooptimizer.windowsupdates.repl.co/function.exe
Targets
-
-
Target
Mass Dmer.bat
-
Size
1KB
-
MD5
5ac8897ff732070a7ffe9147c599e01e
-
SHA1
39db3eccc2d8a1e06038282c49c6af405cf44431
-
SHA256
0ad689faa00e511421c71ea560cb430a29c4de5572c8be8b8f1df2974bce02b5
-
SHA512
7951c6f9d2fdf3450fdc76befca65587aa2c13fec385afa272f2359d8778379e9cebf9fdcc06ce636b162f1505d15ae15aa165deb1bac748eaba275891fb1c0b
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-