Concerned About Your Business Cyber Security?

(877) 321--7374

Malicious Post-Exploitation Batch File, (Tue, Jun 5th)

Here is another interesting file that I found while hunting. It is a malicious Windows batch file (.bat) which helps to exploit a freshly compromised system (or… to be used by a rogue user). I don’t have a lot of information about the file origin, I found it on VT (SHA256: 1a611b3765073802fb9ff9587ed29b5d2637cf58adb65a337a8044692e1184f2)[1]. The script is very simple and relies on standard windows system tools and external utilities downloaded when neede.

Ready For ASuperheroI.T. Solution?

Real Time Web Analytics