Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
THE GAME.bat
Resource
win7-20240215-en
windows7-x64
31 signatures
150 seconds
General
-
Target
THE GAME.bat
-
Size
9KB
-
MD5
906123d2f74595fb0c2639f824a7396c
-
SHA1
779343762d325653e363e3097b5774126a58ac91
-
SHA256
1ed5fd8c44c9dbc6d6fdff02bd8e774dbb47c93b97cc89bee7376c9db15f49c9
-
SHA512
6c56e1af7ae3818a06e490d8fcef2040d9ac422ca6288b8a770528451fcb482508f99408b57d246ab012f62a8ddb792b9cf016a5e3556799c493bd4390502a2b
-
SSDEEP
192:5eR/b5lTUeT5stFiCNRWzWUCNRWzWnMT3RV3yqDZlo0o/hr+pMnKFYjQF2eiwAuc:5eRnVWiCO6UCO6nMTBV3yqDZej/hr+p0
Score
7/10
Malware Config
Signatures
-
Checks for this command that runs a batch skript as administrator: net session >nul 2>&1 || (powershell start -verb runas '"%~0"' &exit /b) 1 IoCs
The Command is used in malicious skripts to make shure they are run as Administrator.
resource yara_rule sample DetectNetSessionCommand_FA
Files
-
THE GAME.bat.bat .vbs