General
-
Target
sassy batch.bat
-
Size
1KB
-
Sample
240613-pdvsqayalg
-
MD5
d68ef68c8be9634156014bf491960401
-
SHA1
2f7034f26f7e7d815ef0ff4cd3efbc2b011865df
-
SHA256
dfae70a812badc5974cadb5165e3924b9f47037db4e6a2dbaf3107ce3a1eaf0b
-
SHA512
855353b2871ea9e88621f86647f110652abf3d0b4fb22d5a8bc95f7112ef3a1b5fc65a382c80b7d4b7efd15991d76ec0232507e0b86b9031004c37afcbd24f2b
Static task
static1
Behavioral task
behavioral1
Sample
sassy batch.bat
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
sassy batch.bat
-
Size
1KB
-
MD5
d68ef68c8be9634156014bf491960401
-
SHA1
2f7034f26f7e7d815ef0ff4cd3efbc2b011865df
-
SHA256
dfae70a812badc5974cadb5165e3924b9f47037db4e6a2dbaf3107ce3a1eaf0b
-
SHA512
855353b2871ea9e88621f86647f110652abf3d0b4fb22d5a8bc95f7112ef3a1b5fc65a382c80b7d4b7efd15991d76ec0232507e0b86b9031004c37afcbd24f2b
Score10/10-
Modifies Installed Components in the registry
-
Modifies Windows Firewall
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2