General
-
Target
lol.bat
-
Size
3KB
-
Sample
240305-nycxzaea41
-
MD5
9ed385f24f72788d430208e367e254f9
-
SHA1
668e1f20ca6d0961260b929ed1dbd4839da2a26b
-
SHA256
fd2991637f68b3119ef871f1cf06679f6f953e7f5fe01d3dd70f911d016f47c8
-
SHA512
a6c6f5c0c016574a5adedb7ab05daf4de6a5ca375d37fc5f320ecdea7d158f79b3a82b7974b4fe913fa5638133a62fe04386f53f2997c4810bdbb04dfda0c29b
Static task
static1
Behavioral task
behavioral1
Sample
lol.bat
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
lol.bat
-
Size
3KB
-
MD5
9ed385f24f72788d430208e367e254f9
-
SHA1
668e1f20ca6d0961260b929ed1dbd4839da2a26b
-
SHA256
fd2991637f68b3119ef871f1cf06679f6f953e7f5fe01d3dd70f911d016f47c8
-
SHA512
a6c6f5c0c016574a5adedb7ab05daf4de6a5ca375d37fc5f320ecdea7d158f79b3a82b7974b4fe913fa5638133a62fe04386f53f2997c4810bdbb04dfda0c29b
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Possible privilege escalation attempt
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-