General
-
Target
Dark_Store.bat
-
Size
13KB
-
Sample
240405-tpp4tsge7y
-
MD5
69069bbb870f601aa4d0be94219bfc8a
-
SHA1
5a5cfa40d48e2853ba26df9c006de00be82a536a
-
SHA256
f7b6c95549dae14a2f329d854b39b13b49c0cc9aa1503713d03fb55307d62ff1
-
SHA512
3047c87557b66ee6ea8f7ad95561c658f782ecbcfaf281d37518f2a6c423e3dd7577076dfe0d3ad0da07d42606165dfc32e125870820d6edd62fd360b409e893
-
SSDEEP
384:p9+4vYKSDB7EEzsmERH5Zc94dL7EEzsmE7HBZBubZQ+owhJl:P+AODDbSos
Static task
static1
Behavioral task
behavioral1
Sample
Dark_Store.bat
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
Dark_Store.bat
-
Size
13KB
-
MD5
69069bbb870f601aa4d0be94219bfc8a
-
SHA1
5a5cfa40d48e2853ba26df9c006de00be82a536a
-
SHA256
f7b6c95549dae14a2f329d854b39b13b49c0cc9aa1503713d03fb55307d62ff1
-
SHA512
3047c87557b66ee6ea8f7ad95561c658f782ecbcfaf281d37518f2a6c423e3dd7577076dfe0d3ad0da07d42606165dfc32e125870820d6edd62fd360b409e893
-
SSDEEP
384:p9+4vYKSDB7EEzsmERH5Zc94dL7EEzsmE7HBZBubZQ+owhJl:P+AODDbSos
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-