Resubmissions

22-02-2024 09:45

240222-lrcmhsfh69 10

21-02-2024 16:36

240221-t4e76sbb3y 8

21-02-2024 15:26

240221-svfa5shh4z 6

21-02-2024 15:19

240221-sp5nvaad77 10

General

  • Target

    https://go.enderman.ch/repository

  • Sample

    240222-lrcmhsfh69

Malware Config

Targets

    • Target

      https://go.enderman.ch/repository

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (56) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks