General

  • Target

    Yenii.exe

  • Size

    81.6MB

  • Sample

    240812-m7treasdre

  • MD5

    2fc2eb8fc45d65e9569d0d20edc202e3

  • SHA1

    0b13f7846c6ad82ae5dea6bb74594a55fc34ef11

  • SHA256

    21d7cae8886b7911b9262c4d3bb771ee134e7e8f3ac54b70cd4d98d76255a760

  • SHA512

    37dd92ca60ef0d4844b34410457fd67bbf91c9e905c55a72b6dcced1d3da85b1a3e22b9bb16eb43e82d6442f81cb2676ab10f2479ccbbea5f0c862c6ff36e218

  • SSDEEP

    1572864:ovxZQglBWg7vaSk8IpG7V+VPhqQdSiE70lg3iYgj+h58sMwhGD1NwJk:ovxZxLPeSkB05awkSgeJ5dcL

Malware Config

Targets

    • Target

      Yenii.exe

    • Size

      81.6MB

    • MD5

      2fc2eb8fc45d65e9569d0d20edc202e3

    • SHA1

      0b13f7846c6ad82ae5dea6bb74594a55fc34ef11

    • SHA256

      21d7cae8886b7911b9262c4d3bb771ee134e7e8f3ac54b70cd4d98d76255a760

    • SHA512

      37dd92ca60ef0d4844b34410457fd67bbf91c9e905c55a72b6dcced1d3da85b1a3e22b9bb16eb43e82d6442f81cb2676ab10f2479ccbbea5f0c862c6ff36e218

    • SSDEEP

      1572864:ovxZQglBWg7vaSk8IpG7V+VPhqQdSiE70lg3iYgj+h58sMwhGD1NwJk:ovxZxLPeSkB05awkSgeJ5dcL

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks