General

  • Target

    new.cmd

  • Size

    2KB

  • Sample

    240530-rknzvsbc7t

  • MD5

    3b336b745f4ce4fb08b0125cfb4da3b3

  • SHA1

    de95e189177cede1c6123624b7b9910c20505c1c

  • SHA256

    d78f6febfb1a50a70018bec9577db957bd33c58a18257d113e330ce52ee2f7ab

  • SHA512

    1ec1ba7de48f7d3ac6f8e1cf80e7d0b376e7fa88b1d932c54124d8b49020ffe850f2cad1a999c89f9adbfef9dc4ded7699a3b6340620c8fef1a14b89baf8d0c6

Score
8/10

Malware Config

Targets

    • Target

      new.cmd

    • Size

      2KB

    • MD5

      3b336b745f4ce4fb08b0125cfb4da3b3

    • SHA1

      de95e189177cede1c6123624b7b9910c20505c1c

    • SHA256

      d78f6febfb1a50a70018bec9577db957bd33c58a18257d113e330ce52ee2f7ab

    • SHA512

      1ec1ba7de48f7d3ac6f8e1cf80e7d0b376e7fa88b1d932c54124d8b49020ffe850f2cad1a999c89f9adbfef9dc4ded7699a3b6340620c8fef1a14b89baf8d0c6

    Score
    8/10
    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

MITRE ATT&CK Enterprise v15

Tasks