General
-
Target
gqub.bat
-
Size
3KB
-
Sample
250101-js9mja1rfk
-
MD5
bb445d197063475c8d78de4f0825753c
-
SHA1
158a8e3b278affe7c1185aad67683e4253cf53dd
-
SHA256
7066e4a496d83ee1b677ade06c868a432bb4a0dd364b19ee184147a527b11c10
-
SHA512
173cd8a56e2fa6e8db33bc13870f8751473251aa80be2235321e62b0f84961e9fd00a236aec63342d73f262dbc7c2a920951a1a8f41707ca6640e673f21c4307
Static task
static1
Behavioral task
behavioral1
Sample
gqub.bat
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
gqub.bat
-
Size
3KB
-
MD5
bb445d197063475c8d78de4f0825753c
-
SHA1
158a8e3b278affe7c1185aad67683e4253cf53dd
-
SHA256
7066e4a496d83ee1b677ade06c868a432bb4a0dd364b19ee184147a527b11c10
-
SHA512
173cd8a56e2fa6e8db33bc13870f8751473251aa80be2235321e62b0f84961e9fd00a236aec63342d73f262dbc7c2a920951a1a8f41707ca6640e673f21c4307
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Venomrat family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-