Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
RNS/RNS.bat
Resource
win11-20240426-en
windows11-21h2-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
RNS/RNS.html
Resource
win11-20240419-en
windows11-21h2-x64
21 signatures
150 seconds
General
-
Target
RNS.zip
-
Size
1KB
-
MD5
19367930822b548c5a0c8e88b823a480
-
SHA1
65bf4908621c13b087c253e50731308f0d7a9715
-
SHA256
9665c9eb46dcd767f8df581d174f4cfabcb9977cb2213ca32a86b5c337327970
-
SHA512
1adce766416d10de54999bff4d4a23692c50eccc72e350113a0478b5116feb36b6a2c20e71ee157a5176eb09a548867e50831eaad66c3dc1dad2c10065446ca4
Score
7/10
Malware Config
Signatures
-
Checks for this command that runs a batch skript as administrator: net session >nul 2>&1 || (powershell start -verb runas '"%~0"' &exit /b) 1 IoCs
The Command is used in malicious skripts to make shure they are run as Administrator.
resource yara_rule static1/unpack001/RNS/RNS.bat DetectNetSessionCommand_FA
Files
-
RNS.zip.zip
-
RNS/RNS.bat
-
RNS/RNS.html.html