Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
THE GAME.bat
Resource
win10v2004-20240508-en
10 signatures
150 seconds
General
-
Target
THE GAME.bat
-
Size
9KB
-
MD5
7c23db43a6fdf107b7579b649f8543ea
-
SHA1
56b12bd090be8dafadb754d225f9733a8eea2e77
-
SHA256
3111ca651c6115f5aad4df2c14d1a96be7144eb053300552aad0513685b20fe5
-
SHA512
aaf5d320aee20c38d3407e542fe2ef5c3e9b279471e054327d1e89be0d0a9d9b5e94773fb80e4f4f526581521c7f81cc5da37ba0e9d08bfb728fa0b333f9094f
-
SSDEEP
192:5eR/b5lTUeT5skMiCNRWzWUCNRWzWnMT3RV3yqDZlo0o/hr+pMnKFYjQF2eiwAuc:5eRnVMiCO6UCO6nMTBV3yqDZej/hr+p0
Score
7/10
Malware Config
Signatures
-
Checks for this command that runs a batch skript as administrator: net session >nul 2>&1 || (powershell start -verb runas '"%~0"' &exit /b) 1 IoCs
The Command is used in malicious skripts to make shure they are run as Administrator.
resource yara_rule sample DetectNetSessionCommand_FA
Files
-
THE GAME.bat.bat .vbs