General

  • Target

    requirements.bat

  • Size

    1KB

  • Sample

    240117-x4rsradbdl

  • MD5

    3cc7198c407f39e94ea792e5ef82a8ce

  • SHA1

    1659e8a26c320f22f319952f626dd3081587b5b8

  • SHA256

    8f75cc1e17cf0e2300197cc9dbb5f552e5b1654dfed023065195dcdc4e19f5c3

  • SHA512

    0e6b5d2564d246379f36169e3513f8fd25acea8f340caf2ce254370563b0cd02a44ce0ea4a235b13157d1dbc99eb36685fdcf5996a8b0e3957aa3874e369d4ad

Score
8/10

Malware Config

Targets

    • Target

      requirements.bat

    • Size

      1KB

    • MD5

      3cc7198c407f39e94ea792e5ef82a8ce

    • SHA1

      1659e8a26c320f22f319952f626dd3081587b5b8

    • SHA256

      8f75cc1e17cf0e2300197cc9dbb5f552e5b1654dfed023065195dcdc4e19f5c3

    • SHA512

      0e6b5d2564d246379f36169e3513f8fd25acea8f340caf2ce254370563b0cd02a44ce0ea4a235b13157d1dbc99eb36685fdcf5996a8b0e3957aa3874e369d4ad

    Score
    8/10
    • Blocklisted process makes network request

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks