General

  • Target

    RNS.bat

  • Size

    2KB

  • MD5

    7c473424fc08853312b4ad551ff4268a

  • SHA1

    b0febc5e48597cfeba8ae4f5ad3511f6d7765c1e

  • SHA256

    d2ef32eb559b94bca299fbc4c6502524a08b56030eca5783973308246a59989a

  • SHA512

    459c5209f81e677dbe88be102f06dcd0b0f1ddd77a73369064e122895097da9247206df56936ec08193bf1ba63b1207a9a5c726c88611376084f4836ce7c277a

Score
7/10

Malware Config

Signatures

  • Checks for this command that runs a batch skript as administrator: net session >nul 2>&1 || (powershell start -verb runas '"%~0"' &exit /b) 1 IoCs

    The Command is used in malicious skripts to make shure they are run as Administrator.

Files

  • RNS.bat