Rar | 20882

The string typically appears in the path ...\20882\Rar$Scan... when a malicious archive is extracted or scanned by WinRAR. Reports from the malware analysis platform ANY.RUN indicate this specific directory was used during the execution of a multi-stage infection chain. Technical Findings

: WinRAR.exe spawning cmd.exe to run .bat scripts from temporary folders. 20882 rar

: Look for variations of Rar$Scan[Number].bat . The string typically appears in the path

: C:\Users\admin\AppData\Local\Temp\20882\ (or similar Temp subdirectories). 20882 rar

: The malicious activity was documented on a system running under an "admin" user profile within a Microsoft Corporation environment, indicating a target-agnostic or broad-reaching delivery method. Key Indicators of Compromise (IoCs)

Malware analysis ibso9p0sjp44crzm.7z Malicious activity | ANY.RUN