General

  • Target

    WINCL 1.8.0.bat

  • Size

    1.3MB

  • Sample

    241129-y1x12atqd1

  • MD5

    3de7393999fb7fa0931e95a0ecc28064

  • SHA1

    a26172904b514a1d0b96f671af9cf57c0433a69f

  • SHA256

    a5a0b353ba2e76e46e3566329f212aaf71c7acc7d0dd4c2689dad5d543effa13

  • SHA512

    e6ea002fde658e4e4efc4986b19745374af5555c623f2674030e46a279f5d6fd26a7660e208899a0a41acdc99925771ea972ef54939d4c6bc716612b7f4d3f13

  • SSDEEP

    12288:RBCF22juRhMkbZubgbab/b+BV0L6clOXs1w:RXMkk82zwb

Malware Config

Targets

    • Target

      WINCL 1.8.0.bat

    • Size

      1.3MB

    • MD5

      3de7393999fb7fa0931e95a0ecc28064

    • SHA1

      a26172904b514a1d0b96f671af9cf57c0433a69f

    • SHA256

      a5a0b353ba2e76e46e3566329f212aaf71c7acc7d0dd4c2689dad5d543effa13

    • SHA512

      e6ea002fde658e4e4efc4986b19745374af5555c623f2674030e46a279f5d6fd26a7660e208899a0a41acdc99925771ea972ef54939d4c6bc716612b7f4d3f13

    • SSDEEP

      12288:RBCF22juRhMkbZubgbab/b+BV0L6clOXs1w:RXMkk82zwb

    • Modifies Windows Defender Real-time Protection settings

    • Modifies boot configuration data using bcdedit

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to get system information.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Remote Services: SMB/Windows Admin Shares

      Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).

MITRE ATT&CK Enterprise v15

Tasks