General
-
Target
requirements.bat
-
Size
1KB
-
Sample
240117-x4rsradbdl
-
MD5
3cc7198c407f39e94ea792e5ef82a8ce
-
SHA1
1659e8a26c320f22f319952f626dd3081587b5b8
-
SHA256
8f75cc1e17cf0e2300197cc9dbb5f552e5b1654dfed023065195dcdc4e19f5c3
-
SHA512
0e6b5d2564d246379f36169e3513f8fd25acea8f340caf2ce254370563b0cd02a44ce0ea4a235b13157d1dbc99eb36685fdcf5996a8b0e3957aa3874e369d4ad
Static task
static1
Behavioral task
behavioral1
Sample
requirements.bat
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
requirements.bat
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
requirements.bat
-
Size
1KB
-
MD5
3cc7198c407f39e94ea792e5ef82a8ce
-
SHA1
1659e8a26c320f22f319952f626dd3081587b5b8
-
SHA256
8f75cc1e17cf0e2300197cc9dbb5f552e5b1654dfed023065195dcdc4e19f5c3
-
SHA512
0e6b5d2564d246379f36169e3513f8fd25acea8f340caf2ce254370563b0cd02a44ce0ea4a235b13157d1dbc99eb36685fdcf5996a8b0e3957aa3874e369d4ad
Score8/10-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-