General
-
Target
yeno.rar
-
Size
12.9MB
-
Sample
240207-2p8j6sbc57
-
MD5
1063f6fa94832e40cf159577b2606c79
-
SHA1
db242c2b3232409d571d49c8b931e75037662215
-
SHA256
d76259ee1a43f8fd4dffdb76c4b58ae9f476c36871af0c9e9ceb335cf8a758d9
-
SHA512
e8aa66d81fa39412ff07d70a91f34f18c9af8e8abe363d3e98bd5eba63475044dcbf7e3e34388b688267809c6204b411889248abd150b74ebe073a56c6f28502
-
SSDEEP
393216:8uwrZG3uvXsClfhCxxHZGFS1L1NWnPs8r5F:/Qw+UClJEHZGFS1LgEC5F
Behavioral task
behavioral1
Sample
yeno assist.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
yeno assist.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
creal.pyc
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
creal.pyc
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
yeno assist.exe
-
Size
13.2MB
-
MD5
9bb8716c630c824e776fedf1d0d876f6
-
SHA1
e57c91850425b04c38e48bd1d05846db2c0ff9b9
-
SHA256
292468b8c0085a821e1546c601f41ff55505af5b5ecf09383964e8a558ac6d51
-
SHA512
dd492a937b5e5391446b8220621b5be7f3b4295264e7a6c8f3caf24d3d58511244c0e52722b67e33992185963940c5c924874b6566adc9fb96546fcb7eec615a
-
SSDEEP
393216:DEkMD2nwW+eGQRIMTozGxu8C0ibfz6e57Q1bmXiWCUI:DUDawW+e5R5oztZ026e5uFVUI
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
creal.pyc
-
Size
53KB
-
MD5
d57cf76bc9d4158773bd335fc1ca207e
-
SHA1
d69be95135b1028fb6fb3043854fa94a5a97cf29
-
SHA256
b18befb3044fe1773846c72752ff0dd63aeb02b231972d94d23018fc51d1db9f
-
SHA512
082a46834c0811005073a522d26384a8bb215dfc3e5348c419deb3e2fdafde0ede57e309ee0d09fc1735273499dbfc78faa5f18981ebeea998773df40685da8b
-
SSDEEP
1536:2raaqMamq3YwmQyLCipnml5ZOhLQmGwCo3gX:2u7MapmJpnDSou
Score3/10 -