General

  • Target

    Yolk.exe

  • Size

    614KB

  • Sample

    240309-kq1saaec55

  • MD5

    dc5a44ef4eb172240cdc8caf46c3b914

  • SHA1

    e547ee256a1f4617959b1f1d0f7119b67d673793

  • SHA256

    02287bb15e2cdc4638209d969bd8b88693e47c6fa30fddb6039adaf649bfb4ad

  • SHA512

    77a5e75929f6f9bc2c14343d827ab0394b7d8bb46cec6760c96390cc3ae36a75d030b3d790ec5ae5b038fa7713a51fed6c23882589f8ac0d7f521bbdea251eb4

  • SSDEEP

    12288:M4mjiqrwQ5hiqPwKfCs0mduQmhbefpMCTLwAQz5UTN9ELRVOwPwilZMc/3:sTfuqPw8CsTmReh3FQ1C6LRVOHilZMcv

Score
7/10

Malware Config

Targets

    • Target

      Yolk.exe

    • Size

      614KB

    • MD5

      dc5a44ef4eb172240cdc8caf46c3b914

    • SHA1

      e547ee256a1f4617959b1f1d0f7119b67d673793

    • SHA256

      02287bb15e2cdc4638209d969bd8b88693e47c6fa30fddb6039adaf649bfb4ad

    • SHA512

      77a5e75929f6f9bc2c14343d827ab0394b7d8bb46cec6760c96390cc3ae36a75d030b3d790ec5ae5b038fa7713a51fed6c23882589f8ac0d7f521bbdea251eb4

    • SSDEEP

      12288:M4mjiqrwQ5hiqPwKfCs0mduQmhbefpMCTLwAQz5UTN9ELRVOwPwilZMc/3:sTfuqPw8CsTmReh3FQ1C6LRVOHilZMcv

    Score
    7/10
    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      a4dd044bcd94e9b3370ccf095b31f896

    • SHA1

      17c78201323ab2095bc53184aa8267c9187d5173

    • SHA256

      2e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc

    • SHA512

      87335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a

    • SSDEEP

      192:em24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlESl:m8QIl975eXqlWBrz7YLOlE

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks