Resubmissions

10-05-2024 23:50

240510-3vpjxsha2s 7

General

  • Target

    bsod uwu .3 silly uwu .cmd

  • Size

    101B

  • MD5

    85a79be034c9f35e8d93fceb6c2c19e1

  • SHA1

    8e3599eac61e240dfd8c0637c7374ae87c54928d

  • SHA256

    a8a835a58def67f4a176d105dbbd26e220158f853e2dab0efbd54106bc58b051

  • SHA512

    ec46d5c977279ecc7d2395536e6f496f597b1f4d1278332359bff382ef8c3b69982fec55b4b21cb9ea504b9ed1370597e024149f840c9c584949d6d4158b0d98

Score
7/10

Malware Config

Signatures

  • Checks for this command that runs a batch skript as administrator: net session >nul 2>&1 || (powershell start -verb runas '"%~0"' &exit /b) 1 IoCs

    The Command is used in malicious skripts to make shure they are run as Administrator.

Files

  • bsod uwu .3 silly uwu .cmd