Resubmissions

10/08/2024, 18:42

240810-xcna9awgke 10

10/08/2024, 18:41

240810-xbw7rswfqh 10

10/08/2024, 18:40

240810-xbl2sswfph 10

General

  • Target

    Yenii.exe

  • Size

    8.2MB

  • Sample

    240810-xbl2sswfph

  • MD5

    a28680dee68d4c71d990af1a2985f91a

  • SHA1

    bd4111fef857e77a4c238ceec8621aa4d9d69ab5

  • SHA256

    de91f611c443a09dd9a93afbdbe68f08213c55004a75b12fa08d1d9961b3d0d9

  • SHA512

    86fccc5d49c6faf595c220b18f73d136827b816d2ec420e74f80fbf888e17966a95a6e3b666ac9bc215d8c50c9a6bc14dec824e0e132dbed0fc6f321bc370329

  • SSDEEP

    196608:I4A9VgwurErvI9pWjgfPvzm6gs/SEjE14AE:34ywurEUWjC3zDAa04AE

Malware Config

Targets

    • Target

      Yenii.exe

    • Size

      8.2MB

    • MD5

      a28680dee68d4c71d990af1a2985f91a

    • SHA1

      bd4111fef857e77a4c238ceec8621aa4d9d69ab5

    • SHA256

      de91f611c443a09dd9a93afbdbe68f08213c55004a75b12fa08d1d9961b3d0d9

    • SHA512

      86fccc5d49c6faf595c220b18f73d136827b816d2ec420e74f80fbf888e17966a95a6e3b666ac9bc215d8c50c9a6bc14dec824e0e132dbed0fc6f321bc370329

    • SSDEEP

      196608:I4A9VgwurErvI9pWjgfPvzm6gs/SEjE14AE:34ywurEUWjC3zDAa04AE

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks