General
-
Target
dont run this.bat
-
Size
1013B
-
Sample
240603-b75ywsfa3w
-
MD5
b4b00681eae6600fb830308d762457fd
-
SHA1
d2d11d34e7c91bf486833265adade5769f406618
-
SHA256
01c29ea7e2b4ddecf7ba8a1044c8238a7a1e9bc98f2a5ffa33f43390fcedbe28
-
SHA512
d4b4358580da3018436a9a34ec151f9912cc1675edb9474094570ca6aef4e427bf15de28f24f354a9b8cb0554c094f5c941e6461dc350fcad45ac9770b338209
Static task
static1
Behavioral task
behavioral1
Sample
dont run this.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dont run this.bat
Resource
win10v2004-20240508-en
Malware Config
Extracted
https://discord.com/api/webhooks/1247000288225788047/oaRJxaQkZ4jd8bhyZ6D4CaCKZyABlCK57qxox_DUnvGNxpCHeu453BFy2inhhHWNBd7A
Targets
-
-
Target
dont run this.bat
-
Size
1013B
-
MD5
b4b00681eae6600fb830308d762457fd
-
SHA1
d2d11d34e7c91bf486833265adade5769f406618
-
SHA256
01c29ea7e2b4ddecf7ba8a1044c8238a7a1e9bc98f2a5ffa33f43390fcedbe28
-
SHA512
d4b4358580da3018436a9a34ec151f9912cc1675edb9474094570ca6aef4e427bf15de28f24f354a9b8cb0554c094f5c941e6461dc350fcad45ac9770b338209
Score10/10-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Manipulates Digital Signatures
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Modifies termsrv.dll
Commonly used to allow simultaneous RDP sessions.
-