General
-
Target
start.bat
-
Size
29B
-
Sample
240706-ky6nhatbnl
-
MD5
03e59106a692a466cf7eb6f3c2d21e8d
-
SHA1
434f628afc145600bfb6c43ac5567f491be150ee
-
SHA256
4ac7811b1a99b6d5c4679a493c81ce32dda14ea9d14a5f0cbe677d046911502d
-
SHA512
806fb23106b3e54aaa3b683702bb495da6a30660a6b1d72c4ab4b97e5e001a78bc463456242d876b8f01cd2d88f0a2f103197367809ea7b9bda02d2c474a251f
Static task
static1
Behavioral task
behavioral1
Sample
start.bat
Resource
win11-20240704-en
Malware Config
Targets
-
-
Target
start.bat
-
Size
29B
-
MD5
03e59106a692a466cf7eb6f3c2d21e8d
-
SHA1
434f628afc145600bfb6c43ac5567f491be150ee
-
SHA256
4ac7811b1a99b6d5c4679a493c81ce32dda14ea9d14a5f0cbe677d046911502d
-
SHA512
806fb23106b3e54aaa3b683702bb495da6a30660a6b1d72c4ab4b97e5e001a78bc463456242d876b8f01cd2d88f0a2f103197367809ea7b9bda02d2c474a251f
Score7/10-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-