General

  • Target

    a87af64dfea31dd2e08ae33b9a595b37ed4fa1511f195caa498ee9d51199528c

  • Size

    479KB

  • Sample

    241104-twqnyaslaz

  • MD5

    2bc77cbaca6f8ac04a0e4d698cf5133a

  • SHA1

    34252120652ba3a20588aa557337538d21e5ed88

  • SHA256

    a87af64dfea31dd2e08ae33b9a595b37ed4fa1511f195caa498ee9d51199528c

  • SHA512

    fc14834e588ac87ea762a181ac12d1a59ca0fc60edb20ac1323493543760b641a6d9951c1bc3e04c66cf3692a284b793eff2cf9d8ab4050fb58d543780c24563

  • SSDEEP

    12288:K3s/A44AVZhW33fUnE6J5Ur5pxogQNUhIK/0c2qnAf:K30ASVZ0nfs5U1sS7B2qng

Malware Config

Targets

    • Target

      a87af64dfea31dd2e08ae33b9a595b37ed4fa1511f195caa498ee9d51199528c

    • Size

      479KB

    • MD5

      2bc77cbaca6f8ac04a0e4d698cf5133a

    • SHA1

      34252120652ba3a20588aa557337538d21e5ed88

    • SHA256

      a87af64dfea31dd2e08ae33b9a595b37ed4fa1511f195caa498ee9d51199528c

    • SHA512

      fc14834e588ac87ea762a181ac12d1a59ca0fc60edb20ac1323493543760b641a6d9951c1bc3e04c66cf3692a284b793eff2cf9d8ab4050fb58d543780c24563

    • SSDEEP

      12288:K3s/A44AVZhW33fUnE6J5Ur5pxogQNUhIK/0c2qnAf:K30ASVZ0nfs5U1sS7B2qng

    • AdWind

      A Java-based RAT family operated as malware-as-a-service.

    • Adwind family

    • UAC bypass

    • Disables use of System Restore points

    • Event Triggered Execution: Image File Execution Options Injection

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks