General

  • Target

    f.bat

  • Size

    10KB

  • Sample

    240521-x2zqksfg9t

  • MD5

    b4546181de31bb2bc83ee595b0a9b289

  • SHA1

    c862333f457a73a149acdd5fe32e1bbfc5bf89fb

  • SHA256

    0e9658d8475be769872584abcedcb16f2c98c35372c95097e9990613042135e4

  • SHA512

    cf37537c56c83b2d6c3a5ea36fe6501beaa77e8f2ac7dc8a58fdeb4a44da726445aa12d0c91235fad7a4bf579e79433022e472b9a0d3832f4178664c53b8fe1c

  • SSDEEP

    192:kAO9moJlLDKyAh7p2yLSQvJ/b89OCeva+U:kF7HLmlSQvJ/bS9

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://i.imgur.com/QClXLQl.jpg

Targets

    • Target

      f.bat

    • Size

      10KB

    • MD5

      b4546181de31bb2bc83ee595b0a9b289

    • SHA1

      c862333f457a73a149acdd5fe32e1bbfc5bf89fb

    • SHA256

      0e9658d8475be769872584abcedcb16f2c98c35372c95097e9990613042135e4

    • SHA512

      cf37537c56c83b2d6c3a5ea36fe6501beaa77e8f2ac7dc8a58fdeb4a44da726445aa12d0c91235fad7a4bf579e79433022e472b9a0d3832f4178664c53b8fe1c

    • SSDEEP

      192:kAO9moJlLDKyAh7p2yLSQvJ/b89OCeva+U:kF7HLmlSQvJ/bS9

    Score
    10/10
    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

System Information Discovery

1
T1082

Tasks