General
-
Target
HaxV3.bat
-
Size
19KB
-
Sample
240930-bdb4qatdmd
-
MD5
080455e109268953c1afe9d20d7c22fb
-
SHA1
801e47820fa9d0ed0e1e04d243714db5b399fd3f
-
SHA256
a4974426e3db704306253727e47dd47894da3ee3c923b25b78264b4b709b0733
-
SHA512
5f69712f8e938e535dcee63a04291c209ba356e221148512bf21d40908103988d37af28c249f59db99964455dee60f90b9c2badbe5c778af44e6d651fb4f3b6f
-
SSDEEP
384:ZAYOoDZUf9AXdmybtPuAPV7NGKbUD5tf6LEcUzggF:ZAYOoDZUf9AXdmybpuYV7NGKbUD5tf6M
Static task
static1
Behavioral task
behavioral1
Sample
HaxV3.bat
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
HaxV3.bat
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://raw.githubusercontent.com/HaxMultiTool/Buttonws/main/Button.bat
Extracted
https://raw.githubusercontent.com/HaxMultiTool/Buttonws/main/Button2.bat
Extracted
https://raw.githubusercontent.com/HaxMultiTool/Buttonws/main/GetInput.exe
Extracted
https://raw.githubusercontent.com/HaxMultiTool/Buttonws/main/batbox.exe
Extracted
https://raw.githubusercontent.com/HaxMultiTool/Buttonws/main/injector.bat
Extracted
https://raw.githubusercontent.com/HaxMultiTool/Buttonws/main/autofix.bat
Extracted
https://raw.githubusercontent.com/HaxMultiTool/Buttonws/main/admin.bat
Targets
-
-
Target
HaxV3.bat
-
Size
19KB
-
MD5
080455e109268953c1afe9d20d7c22fb
-
SHA1
801e47820fa9d0ed0e1e04d243714db5b399fd3f
-
SHA256
a4974426e3db704306253727e47dd47894da3ee3c923b25b78264b4b709b0733
-
SHA512
5f69712f8e938e535dcee63a04291c209ba356e221148512bf21d40908103988d37af28c249f59db99964455dee60f90b9c2badbe5c778af44e6d651fb4f3b6f
-
SSDEEP
384:ZAYOoDZUf9AXdmybtPuAPV7NGKbUD5tf6LEcUzggF:ZAYOoDZUf9AXdmybpuYV7NGKbUD5tf6M
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-