General

  • Target

    RNS.zip

  • Size

    1KB

  • MD5

    19367930822b548c5a0c8e88b823a480

  • SHA1

    65bf4908621c13b087c253e50731308f0d7a9715

  • SHA256

    9665c9eb46dcd767f8df581d174f4cfabcb9977cb2213ca32a86b5c337327970

  • SHA512

    1adce766416d10de54999bff4d4a23692c50eccc72e350113a0478b5116feb36b6a2c20e71ee157a5176eb09a548867e50831eaad66c3dc1dad2c10065446ca4

Score
7/10

Malware Config

Signatures

  • Checks for this command that runs a batch skript as administrator: net session >nul 2>&1 || (powershell start -verb runas '"%~0"' &exit /b) 1 IoCs

    The Command is used in malicious skripts to make shure they are run as Administrator.

Files

  • RNS.zip
    .zip
  • RNS/RNS.bat
  • RNS/RNS.html
    .html