General

  • Target

    67020079517_20210419_16324653_HesapOzeti PDF.jar

  • Size

    641KB

  • Sample

    210421-celnalm71n

  • MD5

    2292ed191b66e4746ac4d930aa413143

  • SHA1

    7c6c9fa4968c5f7351fa9e6faba8f1c719df74e9

  • SHA256

    3f4d49818d707c08f06e326f317e3353143be6d94d516600c9cd8d3612fd1900

  • SHA512

    c85bde3c9471269c02f35c2461c9998da0727fdb0ccd517ad6fc123931e31a404cb7f44570c12eb1089511f1952234e514ca026fdf2ace11dbbb5abd91b64e07

Malware Config

Targets

    • Target

      67020079517_20210419_16324653_HesapOzeti PDF.jar

    • Size

      641KB

    • MD5

      2292ed191b66e4746ac4d930aa413143

    • SHA1

      7c6c9fa4968c5f7351fa9e6faba8f1c719df74e9

    • SHA256

      3f4d49818d707c08f06e326f317e3353143be6d94d516600c9cd8d3612fd1900

    • SHA512

      c85bde3c9471269c02f35c2461c9998da0727fdb0ccd517ad6fc123931e31a404cb7f44570c12eb1089511f1952234e514ca026fdf2ace11dbbb5abd91b64e07

    • AdWind

      A Java-based RAT family operated as malware-as-a-service.

    • UAC bypass

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Sets file execution options in registry

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

1
T1490

Tasks