General
-
Target
daun.bat
-
Size
26B
-
Sample
240614-yjgmqatbkd
-
MD5
fb13c5908146d39f3a5fdeb69a5254a4
-
SHA1
a6fb64b8bc2e58647569f311b6918dbfdbd82507
-
SHA256
295303516fe6fed6586432afa4e9c0385c526786ae3c6a3be1cc8a561a2a100c
-
SHA512
2de792688627911072182d48e0fc3180a37cc5379272a8b7e429441e3eb69803901b80788848bfdd2f86515ad8a5392fe390b784db38cc7456221f8dea338622
Static task
static1
Behavioral task
behavioral1
Sample
daun.bat
Resource
win10v2004-20240611-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1251198513031811144/nJHl6BhkEHbE3lBzprQbscTSTrEsrKdjTFgv-IrdN8o5_7i-tC4AlCQso26UTjNF8ZHZ
Targets
-
-
Target
daun.bat
-
Size
26B
-
MD5
fb13c5908146d39f3a5fdeb69a5254a4
-
SHA1
a6fb64b8bc2e58647569f311b6918dbfdbd82507
-
SHA256
295303516fe6fed6586432afa4e9c0385c526786ae3c6a3be1cc8a561a2a100c
-
SHA512
2de792688627911072182d48e0fc3180a37cc5379272a8b7e429441e3eb69803901b80788848bfdd2f86515ad8a5392fe390b784db38cc7456221f8dea338622
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-