General

  • Target

    Startup-script.bat

  • Size

    98KB

  • Sample

    241130-ypr1mstkfv

  • MD5

    8eb4e23e8bfed1be98837c83b8bd01d6

  • SHA1

    a406d12d11002bd87314f6a9edc84bb30c532db7

  • SHA256

    a9f9df39909cc07f30ed4e60b0c6024e95c05d4d062c48d15459cf98d52d80c3

  • SHA512

    31d2e0390afe06e9668ff9ce2f517b1b656414b9655d4777c1700ded5b954810a969988c9c2c2409b304f1a588a4820471be224bf084edeaa95cb0f8c6a7648b

  • SSDEEP

    768:OPWVQjLJcQMmrdtXuMuxgFBSHDTFs+umRs4fPmwN1o76ba4COljXx5xYa0MF9PVL:uQMuxqSjX/v

Malware Config

Targets

    • Target

      Startup-script.bat

    • Size

      98KB

    • MD5

      8eb4e23e8bfed1be98837c83b8bd01d6

    • SHA1

      a406d12d11002bd87314f6a9edc84bb30c532db7

    • SHA256

      a9f9df39909cc07f30ed4e60b0c6024e95c05d4d062c48d15459cf98d52d80c3

    • SHA512

      31d2e0390afe06e9668ff9ce2f517b1b656414b9655d4777c1700ded5b954810a969988c9c2c2409b304f1a588a4820471be224bf084edeaa95cb0f8c6a7648b

    • SSDEEP

      768:OPWVQjLJcQMmrdtXuMuxgFBSHDTFs+umRs4fPmwN1o76ba4COljXx5xYa0MF9PVL:uQMuxqSjX/v

    • Modifies boot configuration data using bcdedit

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Remote Services: SMB/Windows Admin Shares

      Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).

MITRE ATT&CK Enterprise v15

Tasks