Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
RNS.bat
Resource
win7-20240221-en
13 signatures
150 seconds
General
-
Target
RNS.bat
-
Size
4KB
-
MD5
a7b9a5e5a2c079de8f71ad6d7feed628
-
SHA1
27cf5dcceea7da5f59832d9efd31f82a62c451f8
-
SHA256
72e08981cd52e4e6d88b62f9fbb4133ac18d4baad084e14a28eb31985455dc88
-
SHA512
6553e22e5c6a7442bd65cebbb1e310d8d8a46c8de9eae35ea21c14b2a843d863c04568e7e3191a470472b0c31bd905197c440a35c4904ebbb35ba44c9391c0fb
-
SSDEEP
96:v0xqu4r494r4w4N4p4+4T4h4i4dCbblTHPAA:v0xz4r494r4w4N4p4+4T4h4i4olTn
Score
7/10
Malware Config
Signatures
-
Checks for this command that runs a batch skript as administrator: net session >nul 2>&1 || (powershell start -verb runas '"%~0"' &exit /b) 1 IoCs
The Command is used in malicious skripts to make shure they are run as Administrator.
resource yara_rule sample DetectNetSessionCommand_FA
Files
-
RNS.bat.bat .vbs