General

  • Target

    yemazo-beta.html

  • Size

    100KB

  • Sample

    241111-z2jqgazmbk

  • MD5

    b0f7360dba89a9f2c0800c2947cf7f59

  • SHA1

    f28de00c3a7ee1a8c317c496a606faea414feda1

  • SHA256

    19d6f5d93cb6c9f12bafcf7c277c7cef3c167108ee5ef501d35241d89675217c

  • SHA512

    da1dea813deaa98e2674d19ac356bca2f5fe92e3d9c7aafe449d07b894ace0b104506da964ad38682cfaf9a478e15fda4f877544b32a09a28f0d0d79c49a8c29

  • SSDEEP

    768:SrTqj7+J5pBmKAD3WnxaNItFxAkjk8JPdwGEtnDrqmfTA80IRre8KDr5M0jcAxwJ:oXuIPdwG+3fTF0IRrelhIAxy

Malware Config

Targets

    • Target

      yemazo-beta.html

    • Size

      100KB

    • MD5

      b0f7360dba89a9f2c0800c2947cf7f59

    • SHA1

      f28de00c3a7ee1a8c317c496a606faea414feda1

    • SHA256

      19d6f5d93cb6c9f12bafcf7c277c7cef3c167108ee5ef501d35241d89675217c

    • SHA512

      da1dea813deaa98e2674d19ac356bca2f5fe92e3d9c7aafe449d07b894ace0b104506da964ad38682cfaf9a478e15fda4f877544b32a09a28f0d0d79c49a8c29

    • SSDEEP

      768:SrTqj7+J5pBmKAD3WnxaNItFxAkjk8JPdwGEtnDrqmfTA80IRre8KDr5M0jcAxwJ:oXuIPdwG+3fTF0IRrelhIAxy

    • Hexon family

    • Hexon stealer

      Hexon is a stealer written in Electron NodeJS.

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks