General

  • Target

    Adil Windows.bat

  • Size

    11KB

  • Sample

    241205-jbaf4svjew

  • MD5

    bc1e97ccdf44d2a52480ef8f56daf32f

  • SHA1

    4e7c69b2faec4a0b6e6e19329c0befa2cba99878

  • SHA256

    69e0375efc3a5c96106dc5eaea7cf9c5ba1c451c3297304d709b4057abe6b862

  • SHA512

    56d86c1399823f236f373cad1e7733fe52be0e96bd0c766a3e68e40720db00c0d1c67a7a86251e2d89b40d17fb11603185da80a94c8a1df645c144bf7979f94c

  • SSDEEP

    192:A9Ac2bMED959MeO7D8HqwlfgvMo2NfcP7b8T0j:UA1QkMeO7D81U2NfBu

Malware Config

Targets

    • Target

      Adil Windows.bat

    • Size

      11KB

    • MD5

      bc1e97ccdf44d2a52480ef8f56daf32f

    • SHA1

      4e7c69b2faec4a0b6e6e19329c0befa2cba99878

    • SHA256

      69e0375efc3a5c96106dc5eaea7cf9c5ba1c451c3297304d709b4057abe6b862

    • SHA512

      56d86c1399823f236f373cad1e7733fe52be0e96bd0c766a3e68e40720db00c0d1c67a7a86251e2d89b40d17fb11603185da80a94c8a1df645c144bf7979f94c

    • SSDEEP

      192:A9Ac2bMED959MeO7D8HqwlfgvMo2NfcP7b8T0j:UA1QkMeO7D81U2NfBu

    • Disables service(s)

    • UAC bypass

    • Modifies boot configuration data using bcdedit

    • Modifies Windows Firewall

    • Stops running service(s)

    • Allows Network login with blank passwords

      Allows local user accounts with blank passwords to access device from the network.

    • Hijack Execution Flow: Executable Installer File Permissions Weakness

      Possible Turn off User Account Control's privilege elevation for standard users.

    • Password Policy Discovery

      Attempt to access detailed information about the password policy used within an enterprise network.

    • Remote Services: SMB/Windows Admin Shares

      Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).

MITRE ATT&CK Enterprise v15

Tasks