General
-
Target
YellowSkull 2.0.exe
-
Size
2.5MB
-
Sample
240920-wtb4wazgrj
-
MD5
660e26001a8891e78135a09d3ec2623f
-
SHA1
bd95c1955be08eaecefa7b3dd1cbdac7387b6d06
-
SHA256
1811c7b5ddcc6637a782bf32db70b60bd0bf3ec2b3498716591f718cda25fd14
-
SHA512
590df723aaa52806f664adec89bf6e8e570a9c88b4858131fb59f23e31ab3302189393bceb58fe1aa71475065aefab2d093d5f8ad6296693d4124e5a10a34e92
-
SSDEEP
49152:cCEz1VWQraflEcY8GSFJ2CBUm5htDRvG0JuH0Xv6GVO8UKlo:cn14QilESfFim15rtxUuo
Behavioral task
behavioral1
Sample
YellowSkull 2.0.exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
YellowSkull 2.0.exe
-
Size
2.5MB
-
MD5
660e26001a8891e78135a09d3ec2623f
-
SHA1
bd95c1955be08eaecefa7b3dd1cbdac7387b6d06
-
SHA256
1811c7b5ddcc6637a782bf32db70b60bd0bf3ec2b3498716591f718cda25fd14
-
SHA512
590df723aaa52806f664adec89bf6e8e570a9c88b4858131fb59f23e31ab3302189393bceb58fe1aa71475065aefab2d093d5f8ad6296693d4124e5a10a34e92
-
SSDEEP
49152:cCEz1VWQraflEcY8GSFJ2CBUm5htDRvG0JuH0Xv6GVO8UKlo:cn14QilESfFim15rtxUuo
Score10/10-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Adds Run key to start application
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4