General
-
Target
https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqblZtN0hNMmxkOTctMzU4aUF0aU1VUEJ3V0dPd3xBQ3Jtc0tsOWk4bExwTFB6Y2RwZFFva2JFVEluTlRZV1V6dUE2SFhES01JM2hJQ01Rb1N2YmxXT1FYdWh2bTk4cktFVW56dV83T21rUjIzeWhjdm9odmZxSk5CQTFvOFduZW85UWJmaTlvYTcyOXVIaXZpaWlpVQ&q=https%3A%2F%2Fgo.enderman.ch%2Fnoescape&v=4oATWyMMH4A
-
Sample
240228-rvdxmsdh3y
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqblZtN0hNMmxkOTctMzU4aUF0aU1VUEJ3V0dPd3xBQ3Jtc0tsOWk4bExwTFB6Y2RwZFFva2JFVEluTlRZV1V6dUE2SFhES01JM2hJQ01Rb1N2YmxXT1FYdWh2bTk4cktFVW56dV83T21rUjIzeWhjdm9odmZxSk5CQTFvOFduZW85UWJmaTlvYTcyOXVIaXZpaWlpVQ&q=https%3A%2F%2Fgo.enderman.ch%2Fnoescape&v=4oATWyMMH4A
Resource
win11-20240221-en
Malware Config
Targets
-
-
Target
https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqblZtN0hNMmxkOTctMzU4aUF0aU1VUEJ3V0dPd3xBQ3Jtc0tsOWk4bExwTFB6Y2RwZFFva2JFVEluTlRZV1V6dUE2SFhES01JM2hJQ01Rb1N2YmxXT1FYdWh2bTk4cktFVW56dV83T21rUjIzeWhjdm9odmZxSk5CQTFvOFduZW85UWJmaTlvYTcyOXVIaXZpaWlpVQ&q=https%3A%2F%2Fgo.enderman.ch%2Fnoescape&v=4oATWyMMH4A
Score10/10-
Modifies WinLogon for persistence
-
Disables RegEdit via registry modification
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1