Resubmissions

02/05/2024, 20:26

240502-y7wfsafa5t 8

02/05/2024, 18:12

240502-ws75xsde3t 7

02/05/2024, 18:11

240502-ws2m5sfe65 7

02/05/2024, 14:45

240502-r4xfcadb93 7

General

  • Target

    RNS.bat

  • Size

    4KB

  • MD5

    a7b9a5e5a2c079de8f71ad6d7feed628

  • SHA1

    27cf5dcceea7da5f59832d9efd31f82a62c451f8

  • SHA256

    72e08981cd52e4e6d88b62f9fbb4133ac18d4baad084e14a28eb31985455dc88

  • SHA512

    6553e22e5c6a7442bd65cebbb1e310d8d8a46c8de9eae35ea21c14b2a843d863c04568e7e3191a470472b0c31bd905197c440a35c4904ebbb35ba44c9391c0fb

  • SSDEEP

    96:v0xqu4r494r4w4N4p4+4T4h4i4dCbblTHPAA:v0xz4r494r4w4N4p4+4T4h4i4olTn

Score
7/10

Malware Config

Signatures

  • Checks for this command that runs a batch skript as administrator: net session >nul 2>&1 || (powershell start -verb runas '"%~0"' &exit /b) 1 IoCs

    The Command is used in malicious skripts to make shure they are run as Administrator.

Files

  • RNS.bat
    .bat .vbs