Overview
overview
10Static
static
10yeno slott...yy.exe
windows7-x64
7yeno slott...yy.exe
windows10-2004-x64
7yeno slott...yy.exe
android-9-x86
yeno slott...yy.exe
android-10-x64
yeno slott...yy.exe
android-11-x64
yeno slott...yy.exe
macos-10.15-amd64
1yeno slott...yy.exe
ubuntu-18.04-amd64
yeno slott...yy.exe
debian-9-armhf
yeno slott...yy.exe
debian-9-mips
yeno slott...yy.exe
debian-9-mipsel
General
-
Target
slotted_DO_NOT_LEAK_LOADER.rar
-
Size
8.0MB
-
Sample
240324-fcdy5sce31
-
MD5
a7804bf3bf7a47566ec0f05625940687
-
SHA1
8172737195dccab632224c333f6b70db8904e8fa
-
SHA256
60eadf810d1795222cbafba0180affe1cf65cc22a565a321102b471b6903eaf1
-
SHA512
eaa2a7908f6cb6de9c830ae4efa685624960ddc991d2178142b70fc84acf6451bc8f970105be774ebfbecfcc57d38c8ab1e4e9a42257c195b7fb0d1e73c15dd0
-
SSDEEP
196608:7EIIN3ruklDH2CPWDxxO9Hcrbhvj2UEh5s8uMvHTQfgo92skMazlb:7E3hbVPWdg9HcrbljsvHpossXa9
Behavioral task
behavioral1
Sample
yeno slotted so sexyyyyyyy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
yeno slotted so sexyyyyyyy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
yeno slotted so sexyyyyyyy.exe
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral4
Sample
yeno slotted so sexyyyyyyy.exe
Resource
android-x64-20240221-en
Behavioral task
behavioral5
Sample
yeno slotted so sexyyyyyyy.exe
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral6
Sample
yeno slotted so sexyyyyyyy.exe
Resource
macos-20240214-en
Behavioral task
behavioral7
Sample
yeno slotted so sexyyyyyyy.exe
Resource
ubuntu1804-amd64-20240226-en
Behavioral task
behavioral8
Sample
yeno slotted so sexyyyyyyy.exe
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral9
Sample
yeno slotted so sexyyyyyyy.exe
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral10
Sample
yeno slotted so sexyyyyyyy.exe
Resource
debian9-mipsel-20240226-en
Malware Config
Targets
-
-
Target
yeno slotted so sexyyyyyyy.exe
-
Size
8.2MB
-
MD5
def8840241246f7ffd84e685fd112df0
-
SHA1
0fe476723a584a4af31db476916b6b7b7103ced6
-
SHA256
677d8b0da2b7f4df529b45f5546b4778ee052f8deaa55972690078547e111fd7
-
SHA512
de06a20842be32d8a14fd8861d6f141f74055f736660899fec3f792115f9a76b41252ce4381b4cd1ccc3f41f7925f1fdb7a7ce982438c100b9a1f94ac88bd560
-
SSDEEP
196608:fjP+sxfN+/urErvI9pWjgU1DEzx7sKL/s1tySEQAkjUWlRH2WR:7XxfE/urEUWjhEhn01tv392WR
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-