General
-
Target
t.bat
-
Size
864B
-
Sample
231113-z7k6gsfa5t
-
MD5
6c5db6669363fe77494ada18a6e5f2fa
-
SHA1
2d6bf0e0ec048cf0e52ffc745ef4eb7c3d6f1860
-
SHA256
3a138a295230f132721473e396032bdd250158b6a1e45323cc520f5fe7985978
-
SHA512
b78bbae047151081025c9051d79cd18cf4adc45c1566a828c4c2236b0d98c702714f7c81f7d5bcba8745015e58540eaa6b91610c9a5879c7a9e973f88eef0bed
Static task
static1
Malware Config
Targets
-
-
Target
t.bat
-
Size
864B
-
MD5
6c5db6669363fe77494ada18a6e5f2fa
-
SHA1
2d6bf0e0ec048cf0e52ffc745ef4eb7c3d6f1860
-
SHA256
3a138a295230f132721473e396032bdd250158b6a1e45323cc520f5fe7985978
-
SHA512
b78bbae047151081025c9051d79cd18cf4adc45c1566a828c4c2236b0d98c702714f7c81f7d5bcba8745015e58540eaa6b91610c9a5879c7a9e973f88eef0bed
-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-