Resubmissions
10-05-2024 23:50
240510-3vpjxsha2s 7Static task
static1
1 signatures
General
-
Target
bsod uwu .3 silly uwu .cmd
-
Size
101B
-
MD5
85a79be034c9f35e8d93fceb6c2c19e1
-
SHA1
8e3599eac61e240dfd8c0637c7374ae87c54928d
-
SHA256
a8a835a58def67f4a176d105dbbd26e220158f853e2dab0efbd54106bc58b051
-
SHA512
ec46d5c977279ecc7d2395536e6f496f597b1f4d1278332359bff382ef8c3b69982fec55b4b21cb9ea504b9ed1370597e024149f840c9c584949d6d4158b0d98
Score
7/10
Malware Config
Signatures
-
Checks for this command that runs a batch skript as administrator: net session >nul 2>&1 || (powershell start -verb runas '"%~0"' &exit /b) 1 IoCs
The Command is used in malicious skripts to make shure they are run as Administrator.
resource yara_rule sample DetectNetSessionCommand_FA
Files
-
bsod uwu .3 silly uwu .cmd