Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
RNS.bat
Resource
win7-20231129-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
RNS.bat
Resource
win10v2004-20240419-en
16 signatures
150 seconds
Behavioral task
behavioral3
Sample
RNS.bat
Resource
win11-20240419-en
7 signatures
150 seconds
General
-
Target
RNS.bat
-
Size
3KB
-
MD5
b44502fc64d60a2a9ddad7ce6ccf29b0
-
SHA1
175ac51f617c7753212afbd71bc56eda473d982d
-
SHA256
997eba700eafccea7a6c85c04fcd5f976c542db324dd8b85e94ae0fc31b791d7
-
SHA512
d9598817dec955968edc5e8e376f7f7df7c3cb38721c055b4ce168a4fddf5ec49b8f7c4d231580a2db543f743430851eb64d67a01b1285d31c567312467b20bf
Score
7/10
Malware Config
Signatures
-
Checks for this command that runs a batch skript as administrator: net session >nul 2>&1 || (powershell start -verb runas '"%~0"' &exit /b) 1 IoCs
The Command is used in malicious skripts to make shure they are run as Administrator.
resource yara_rule sample DetectNetSessionCommand_FA
Files
-
RNS.bat