General

  • Target

    YeniiExternal.exe

  • Size

    76.8MB

  • Sample

    240810-1agx8stajg

  • MD5

    aae3c8d816def81b7b6a2aeecf3f34b5

  • SHA1

    c18edaffb2e41df0b520aa56b32e03b3feee0a2e

  • SHA256

    93debcdc82bee38fc2882fd654db2284347e120e270cc97382dae63330c8e888

  • SHA512

    037876c5a68d3f9bcb63fc0bfa1fff75306cc81e37fed7f1386d68d52ee159801d13df2ccae8f18b6edd907ff5a39639e79b5c92b2b2c5055dd0d0b8e7d95f35

  • SSDEEP

    1572864:XvHcRlaWah7vXSk8IpG7V+VPhqYdfME7tlHegiYweyJulZUdg+hkrafEGV37U:XvHcRQJhTSkB05awcfLdMpuyhkrAto

Malware Config

Targets

    • Target

      YeniiExternal.exe

    • Size

      76.8MB

    • MD5

      aae3c8d816def81b7b6a2aeecf3f34b5

    • SHA1

      c18edaffb2e41df0b520aa56b32e03b3feee0a2e

    • SHA256

      93debcdc82bee38fc2882fd654db2284347e120e270cc97382dae63330c8e888

    • SHA512

      037876c5a68d3f9bcb63fc0bfa1fff75306cc81e37fed7f1386d68d52ee159801d13df2ccae8f18b6edd907ff5a39639e79b5c92b2b2c5055dd0d0b8e7d95f35

    • SSDEEP

      1572864:XvHcRlaWah7vXSk8IpG7V+VPhqYdfME7tlHegiYweyJulZUdg+hkrafEGV37U:XvHcRQJhTSkB05awcfLdMpuyhkrAto

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks