General
-
Target
TheBestSolarafixer.bat
-
Size
133B
-
Sample
240625-3vbyts1eng
-
MD5
9b12b6d3946df1e0dc933af1a554f71f
-
SHA1
120aa2a6cfd106482ab65b2791fef2a7106ebb70
-
SHA256
28a28ea694decd19f7c4b69e4a8319222e304c16d9b2e8275c6a217ede1e3066
-
SHA512
6c812f5b9ca1a2cba133b69c42162b55bb16f91a7e3ad7cc16ac73123e51aa8cc1f786ad939d5f2c88cab704f5102973d469310febe5714ed45395a67f50a3c1
Static task
static1
Behavioral task
behavioral1
Sample
TheBestSolarafixer.bat
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
TheBestSolarafixer.bat
Resource
win11-20240508-en
Malware Config
Targets
-
-
Target
TheBestSolarafixer.bat
-
Size
133B
-
MD5
9b12b6d3946df1e0dc933af1a554f71f
-
SHA1
120aa2a6cfd106482ab65b2791fef2a7106ebb70
-
SHA256
28a28ea694decd19f7c4b69e4a8319222e304c16d9b2e8275c6a217ede1e3066
-
SHA512
6c812f5b9ca1a2cba133b69c42162b55bb16f91a7e3ad7cc16ac73123e51aa8cc1f786ad939d5f2c88cab704f5102973d469310febe5714ed45395a67f50a3c1
Score8/10-
Drops file in Drivers directory
-
Manipulates Digital Signatures
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
-
Boot or Logon Autostart Execution: Print Processors
Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.
-
Modifies file permissions
-
Drops file in System32 directory
-
Modifies termsrv.dll
Commonly used to allow simultaneous RDP sessions.
-