General

  • Target

    Adil Windows - Copy.bat

  • Size

    12KB

  • Sample

    241205-h5b2cszpaq

  • MD5

    2a7086b99fea895c2f2ed23abe77c93c

  • SHA1

    54c39b64f373be5a397e67c10bb17259b6aa7595

  • SHA256

    37705c3cda6ed05001d551d5bd262fbf3163d11338e0c2179ba1db231a7e07f6

  • SHA512

    ebd731316d435edad6ec6b5cde0b5b44166e74e518dc1efc586c733f58a96da4561eb8daa7785107e6c4343c9a44b5db230b0bacf7797afed806e28c15db0c14

  • SSDEEP

    192:AAAcaDMED9DPGeO7D8HqRvfgvpoVN3cP7b8T0zN:zAfoMGeO7D8YjVN3BIN

Malware Config

Targets

    • Target

      Adil Windows - Copy.bat

    • Size

      12KB

    • MD5

      2a7086b99fea895c2f2ed23abe77c93c

    • SHA1

      54c39b64f373be5a397e67c10bb17259b6aa7595

    • SHA256

      37705c3cda6ed05001d551d5bd262fbf3163d11338e0c2179ba1db231a7e07f6

    • SHA512

      ebd731316d435edad6ec6b5cde0b5b44166e74e518dc1efc586c733f58a96da4561eb8daa7785107e6c4343c9a44b5db230b0bacf7797afed806e28c15db0c14

    • SSDEEP

      192:AAAcaDMED9DPGeO7D8HqRvfgvpoVN3cP7b8T0zN:zAfoMGeO7D8YjVN3BIN

    • Disables service(s)

    • UAC bypass

    • Modifies boot configuration data using bcdedit

    • Modifies Windows Firewall

    • Stops running service(s)

    • Allows Network login with blank passwords

      Allows local user accounts with blank passwords to access device from the network.

    • Hijack Execution Flow: Executable Installer File Permissions Weakness

      Possible Turn off User Account Control's privilege elevation for standard users.

    • Password Policy Discovery

      Attempt to access detailed information about the password policy used within an enterprise network.

    • Remote Services: SMB/Windows Admin Shares

      Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).

MITRE ATT&CK Enterprise v15

Tasks