← Back to Pulse Feed
PULSE DETAIL
In late February 2024, a Russian state-sponsored group called APT29 launched a campaign targeting German political parties, employing a new backdoor called WINELOADER. This marks a shift in APT29's priorities, suggesting an evolution influenced by the current geopolitical climate. The attack chain begins with a spear-phishing email containing a malicious ZIP file that initiates a multi-stage infection process, ultimately delivering the WINELOADER backdoor. This detailed analysis explores the tactics, techniques, and procedures used in the initial access stage and provides an in-depth examination of the WINELOADER malware itself, including its capabilities, command and control communication, and evasion techniques.
MITRE ATT&CK & Malware Families
Indicators of Compromise (2)
| TYPE | INDICATOR | DESCRIPTION | CREATED | |
|---|---|---|---|---|
| FileHash-SHA256 | 72b92683052e0c813890caf7b4f8bfd331a8b2afc324dd545d46138f677178c4 | — | 2024-04-17 | |
| YARA | bd7e1b3c1ce33f69ad4296e92628aae6062200cd | — | 2024-04-17 |