General

  • Target

    YamyNuked.exe

  • Size

    21.2MB

  • Sample

    211022-aacemsbhbl

  • MD5

    3964898dbb55586bf55556ab95bf277b

  • SHA1

    885b9510982e0713a8f036d404c1ab23f34a7b60

  • SHA256

    774c3c82a6ba75819070cca4d14f0df9329ebfe5b4dbb2e61423f95281ae7e6d

  • SHA512

    3404856a6a66b1ac8cf45d01cf7b07c7079ec53c67b21ca5148406057c212a02acf9cabc74aa5e82596d8a55a26497d93196b3d42627f5ec885032aae4ebc290

Malware Config

Targets

    • Target

      YamyNuked.exe

    • Size

      21.2MB

    • MD5

      3964898dbb55586bf55556ab95bf277b

    • SHA1

      885b9510982e0713a8f036d404c1ab23f34a7b60

    • SHA256

      774c3c82a6ba75819070cca4d14f0df9329ebfe5b4dbb2e61423f95281ae7e6d

    • SHA512

      3404856a6a66b1ac8cf45d01cf7b07c7079ec53c67b21ca5148406057c212a02acf9cabc74aa5e82596d8a55a26497d93196b3d42627f5ec885032aae4ebc290

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks