Malicious batch file reveals its full behavior ONLY WHEN IT WAS STARTED BY A DOUBLE-CLICK
2024-7-5 18:44:39 Author: www.vmray.com(查看原文) 阅读量:7 收藏

0/64 detections on VirusTotal
as of 04.07.2024

The VMRay Labs team has uncovered a heavily obfuscated malicious batch file that has managed to evade detection on VirusTotal with no security vendors flagging it (0/64). 

This batch file reveals its full behavior only when it’s started by a double-click indicating an actual user, or via the command line, in which case it terminates early.

HASH: c87215ddba4bbda4ff1c9cf6a8d95012e42d3cecfeb1c22e65f7880e4102388b

See why we think this is malicious in plain language.

See the whole path of the sample’s execution

Map the malicious activities on the MITRE ATT&CK Framework

Explore detailed information on the IP addresses, URLs and DNS, including function logs and PCAP Streams

Download the IOCs and artifacts to have a clear picture of the threat.

Download the files that the malware downloads, drops or modifies.

Explore how you can use these insights


文章来源: https://www.vmray.com/malicious-batch-file-reveals-its-full-behavior-only-when-it-was-started-by-a-double-click/
如有侵权请联系:admin#unsafe.sh