Resubmissions

05-12-2024 19:46

241205-yhfc9svrbl 10

05-12-2024 19:03

241205-xqftbstmhr 10

General

  • Target

    Adil Windows.bat

  • Size

    12KB

  • Sample

    241205-xqftbstmhr

  • MD5

    cb107d44ed312ae167260b86b9d1901d

  • SHA1

    47406774f65842ff020290fe34c0175789e2f5d0

  • SHA256

    ae5c64a88ceb35a4cd3748ed27392845405934108bcefff1c965599ba1294f30

  • SHA512

    981f373ec1ff38b4bba875ef8bb5caa5875082c8c6e8f36f8a4593599500195536b522853d686499f6b3908b7845e283b695f9ac370201ffdf319a5ec1a563fd

  • SSDEEP

    192:A9AcZ8zMED95ExPaxmmpeO7D8HqYT1+gvwoKNfcP7b8T0j:UA684zwreO7D89T1rKNfBu

Malware Config

Targets

    • Target

      Adil Windows.bat

    • Size

      12KB

    • MD5

      cb107d44ed312ae167260b86b9d1901d

    • SHA1

      47406774f65842ff020290fe34c0175789e2f5d0

    • SHA256

      ae5c64a88ceb35a4cd3748ed27392845405934108bcefff1c965599ba1294f30

    • SHA512

      981f373ec1ff38b4bba875ef8bb5caa5875082c8c6e8f36f8a4593599500195536b522853d686499f6b3908b7845e283b695f9ac370201ffdf319a5ec1a563fd

    • SSDEEP

      192:A9AcZ8zMED95ExPaxmmpeO7D8HqYT1+gvwoKNfcP7b8T0j:UA684zwreO7D89T1rKNfBu

    • Disables service(s)

    • UAC bypass

    • Modifies boot configuration data using bcdedit

    • Modifies Windows Firewall

    • Stops running service(s)

    • Allows Network login with blank passwords

      Allows local user accounts with blank passwords to access device from the network.

    • Hijack Execution Flow: Executable Installer File Permissions Weakness

      Possible Turn off User Account Control's privilege elevation for standard users.

    • Password Policy Discovery

      Attempt to access detailed information about the password policy used within an enterprise network.

    • Remote Services: SMB/Windows Admin Shares

      Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).

MITRE ATT&CK Enterprise v15

Tasks