General

  • Target

    RNS.bat

  • Size

    3KB

  • MD5

    d94b29daf50bdb0e647a8395e20933c2

  • SHA1

    f2c4fd788fe2a52a4bbf0afe99d522e53997a907

  • SHA256

    3fe4824e4edf4ed855b8d78df1b9a9e0e82fe2bce861fce30c7094d7bb932f12

  • SHA512

    2c25f70e5a2b3adcbdb54068658faf5336545c729b490b771ca05997a1613b33051e9709cc04d9c4201a02cd893f280ae091e025f2bb7dbb82141251ddad3116

Score
7/10

Malware Config

Signatures

  • Checks for this command that runs a batch skript as administrator: net session >nul 2>&1 || (powershell start -verb runas '"%~0"' &exit /b) 1 IoCs

    The Command is used in malicious skripts to make shure they are run as Administrator.

Files

  • RNS.bat