PULSE NAME
An Analysis of WINELOADER
WHITE APT29 AlienVault 2024-04-17 Modified: 2024-04-17
2
IOCs
LOW VOLUME
In late February 2024, a Russian state-sponsored group called APT29 launched a campaign targeting German political parties, employing a new backdoor called WINELOADER. This marks a shift in APT29's priorities, suggesting an evolution influenced by the current geopolitical climate. The attack chain begins with a spear-phishing email containing a malicious ZIP file that initiates a multi-stage infection process, ultimately delivering the WINELOADER backdoor. This detailed analysis explores the tactics, techniques, and procedures used in the initial access stage and provides an in-depth examination of the WINELOADER malware itself, including its capabilities, command and control communication, and evasion techniques.
MITRE ATT&CK & Malware Families
ATT&CK TECHNIQUES
MALWARE FAMILIES
WINELOADER
Indicators of Compromise (2)
All FileHash-SHA256 YARA
TYPEINDICATORDESCRIPTIONCREATED
FileHash-SHA256 72b92683052e0c813890caf7b4f8bfd331a8b2afc324dd545d46138f677178c4 2024-04-17
YARA bd7e1b3c1ce33f69ad4296e92628aae6062200cd 2024-04-17