General
-
Target
yemazo-beta.html
-
Size
100KB
-
Sample
241111-z2jqgazmbk
-
MD5
b0f7360dba89a9f2c0800c2947cf7f59
-
SHA1
f28de00c3a7ee1a8c317c496a606faea414feda1
-
SHA256
19d6f5d93cb6c9f12bafcf7c277c7cef3c167108ee5ef501d35241d89675217c
-
SHA512
da1dea813deaa98e2674d19ac356bca2f5fe92e3d9c7aafe449d07b894ace0b104506da964ad38682cfaf9a478e15fda4f877544b32a09a28f0d0d79c49a8c29
-
SSDEEP
768:SrTqj7+J5pBmKAD3WnxaNItFxAkjk8JPdwGEtnDrqmfTA80IRre8KDr5M0jcAxwJ:oXuIPdwG+3fTF0IRrelhIAxy
Static task
static1
Behavioral task
behavioral1
Sample
yemazo-beta.html
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
yemazo-beta.html
-
Size
100KB
-
MD5
b0f7360dba89a9f2c0800c2947cf7f59
-
SHA1
f28de00c3a7ee1a8c317c496a606faea414feda1
-
SHA256
19d6f5d93cb6c9f12bafcf7c277c7cef3c167108ee5ef501d35241d89675217c
-
SHA512
da1dea813deaa98e2674d19ac356bca2f5fe92e3d9c7aafe449d07b894ace0b104506da964ad38682cfaf9a478e15fda4f877544b32a09a28f0d0d79c49a8c29
-
SSDEEP
768:SrTqj7+J5pBmKAD3WnxaNItFxAkjk8JPdwGEtnDrqmfTA80IRre8KDr5M0jcAxwJ:oXuIPdwG+3fTF0IRrelhIAxy
Score10/10-
Hexon family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1