Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
kein bluescreen.cmd
Resource
win10v2004-20240508-en
4 signatures
150 seconds
General
-
Target
kein bluescreen.cmd
-
Size
122B
-
MD5
7b3110bf04f5ae90d409d7dd1beb74f6
-
SHA1
87708cf168424dc4d0c6310b995b18ac90645e37
-
SHA256
95989ad606c43fcd317f198f9270c30b96f3692fb8436bf70b0fc5af6bce6f97
-
SHA512
28bbf1e1298704925844a2ae2c5f2db246363ae98535e060727c760fbdd2cdd257d8f08a16e6fe229e93889abb32d76769d0e18e7c49be9585898c5eb75a36aa
Score
7/10
Malware Config
Signatures
-
Checks for this command that runs a batch skript as administrator: net session >nul 2>&1 || (powershell start -verb runas '"%~0"' &exit /b) 1 IoCs
The Command is used in malicious skripts to make shure they are run as Administrator.
resource yara_rule sample DetectNetSessionCommand_FA
Files
-
kein bluescreen.cmd