General

  • Target

    test.bat

  • Size

    1007B

  • Sample

    241110-w6eerssfqd

  • MD5

    aab95f328c2e83ddc507e24a05ea2d78

  • SHA1

    f8b7a249a136014e9e4528ae01af8089680f2ecb

  • SHA256

    facb20043be8687bd1d52363511976fbe3199ed30449f135189d0f87dc8e2b61

  • SHA512

    f9092fb6809b198efde702cfa8599422f8a48c33e2aae3f3c356f5206e91c10056b79004ed779040a24e1d785189030c7c93c6124ddc9626707a4a4c89ff1a83

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://bin.homebots.io/f/86590cf0-ce48-483b-bd0f-160db32a386c/1889464b-428c-4dc4-9c01-19ce05d86f8f

Targets

    • Target

      test.bat

    • Size

      1007B

    • MD5

      aab95f328c2e83ddc507e24a05ea2d78

    • SHA1

      f8b7a249a136014e9e4528ae01af8089680f2ecb

    • SHA256

      facb20043be8687bd1d52363511976fbe3199ed30449f135189d0f87dc8e2b61

    • SHA512

      f9092fb6809b198efde702cfa8599422f8a48c33e2aae3f3c356f5206e91c10056b79004ed779040a24e1d785189030c7c93c6124ddc9626707a4a4c89ff1a83

    Score
    10/10
    • Blocklisted process makes network request

    • Executes dropped EXE

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

MITRE ATT&CK Enterprise v15

Tasks