General
-
Target
bf9c2db653827ae40ddb78e9ea5733fbc917cc34247b0931b19ffae49fb31a6c.bat
-
Size
271KB
-
Sample
241122-djw27atjft
-
MD5
e7c99129a04e08ee965a08b79137b6a3
-
SHA1
7e7060bd33efe7eeb2d3b9f2b27244dcd3fe709f
-
SHA256
bf9c2db653827ae40ddb78e9ea5733fbc917cc34247b0931b19ffae49fb31a6c
-
SHA512
89451efa002d7cd75c17ef4beb72d6d156695e83058e112fd85b354cf6085713b320e246264f728147e23980fbd6a512ac8518a118493bd1496971a9b3302b6f
-
SSDEEP
1536:R2Vb2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VR:D
Static task
static1
Behavioral task
behavioral1
Sample
bf9c2db653827ae40ddb78e9ea5733fbc917cc34247b0931b19ffae49fb31a6c.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bf9c2db653827ae40ddb78e9ea5733fbc917cc34247b0931b19ffae49fb31a6c.bat
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://github.com/rouki555/lnk/raw/main/ud.bat
https://github.com/rouki555/dcm/raw/main/Document.zip
Targets
-
-
Target
bf9c2db653827ae40ddb78e9ea5733fbc917cc34247b0931b19ffae49fb31a6c.bat
-
Size
271KB
-
MD5
e7c99129a04e08ee965a08b79137b6a3
-
SHA1
7e7060bd33efe7eeb2d3b9f2b27244dcd3fe709f
-
SHA256
bf9c2db653827ae40ddb78e9ea5733fbc917cc34247b0931b19ffae49fb31a6c
-
SHA512
89451efa002d7cd75c17ef4beb72d6d156695e83058e112fd85b354cf6085713b320e246264f728147e23980fbd6a512ac8518a118493bd1496971a9b3302b6f
-
SSDEEP
1536:R2Vb2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VR:D
-
Blocklisted process makes network request
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-