General
-
Target
YammyLoader.bin.zip
-
Size
108KB
-
Sample
220524-gjdsdsbaal
-
MD5
c4b640c44324ea5c377d5c24fd15086a
-
SHA1
a326be523846272fb4ea7bc98d4be85c359bea8b
-
SHA256
f6553af26bd26235d620d64515b1742f62728fb672a68eee43977452ee3da63c
-
SHA512
b275708f0d30ba6f547a2b78b82f74d3515797710ef4ff0cfbfe827795f90f0d09db1d3f5fb8b551294f22c57d4ed56eb95d545af0aed080450e45d8996bcf88
Static task
static1
Behavioral task
behavioral1
Sample
YammyLoader.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/865278638920171560/PRv_h9uiyjk1_AT7W333rVQwQoum9eVlsbp96PiWNkYCzOjv6NlP7AX9lOzA3VhkP3qz
Targets
-
-
Target
YammyLoader.bin
-
Size
274KB
-
MD5
d058d933c1f937a964c6c3ecd3c56a6b
-
SHA1
1a698f15a55c1cf90c764e331b74a80194cba800
-
SHA256
0902f659e8b8cad29f1e60defaf2e6389f2e94044e4995638b04a4c659bd134c
-
SHA512
8c91a82e29edc4e7614f1f6cae38951301560168acd2bc656d12b7774729e5977bb28feba6a9fcc09dac13ef9dd98c04a3bce80914a3233e3708965e134db0da
Score10/10-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-