General
-
Target
s.bat
-
Size
1KB
-
Sample
241221-sjn4xa1qdy
-
MD5
ccc7afd46efac5aca2f96dc6c6d757b5
-
SHA1
981911ae2cf8c85fd9bbb70ea938105617c2aefd
-
SHA256
35347449c9856b13ee6f4131fc675270c55566881a19cc3d6bc5d2b0709412bb
-
SHA512
1d336a5827812cd871bdb1459536c5052e4cc50bde82d3e5fd7e474a1488bf55a0763f1d2cac7f6569a2ac6334f066a465cb7b74e52ddbb2d23bd2a31e7b3563
Behavioral task
behavioral1
Sample
s.bat
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
s.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
s.bat
Resource
win10ltsc2021-20241211-en
Malware Config
Targets
-
-
Target
s.bat
-
Size
1KB
-
MD5
ccc7afd46efac5aca2f96dc6c6d757b5
-
SHA1
981911ae2cf8c85fd9bbb70ea938105617c2aefd
-
SHA256
35347449c9856b13ee6f4131fc675270c55566881a19cc3d6bc5d2b0709412bb
-
SHA512
1d336a5827812cd871bdb1459536c5052e4cc50bde82d3e5fd7e474a1488bf55a0763f1d2cac7f6569a2ac6334f066a465cb7b74e52ddbb2d23bd2a31e7b3563
-
XMRig Miner payload
-
Xmrig family
-
Blocklisted process makes network request
-
Executes dropped EXE
-