PULSE NAME
Wineloader - Analysis of the Infection Chain
WHITE APT29 AlienVault 2024-06-06 Modified: 2024-06-06
15
IOCs
MEDIUM VOLUME
The analysis examines the Wineloader backdoor, a modular malware attributed to the APT29 threat group, which allows further tools or modules to be downloaded through an encrypted command and control channel. It starts with a phishing email luring targets with a wine tasting event invitation. Executing the obfuscated HTA file downloads the Wineloader payload, which utilizes sideloading and creates scheduled tasks or registry entries for persistence. Techniques to deobfuscate the JavaScript code are provided to extract valuable intelligence from obfuscated payloads.
MITRE ATT&CK & Malware Families
ATT&CK TECHNIQUES
MALWARE FAMILIES
Wineloader
Indicators of Compromise (3 / 15 total)
All FileHash-MD5 FileHash-SHA1 FileHash-SHA256
TYPEINDICATORDESCRIPTIONCREATED
FileHash-MD5 30a762f747ba9432673b8b94066b270a 2024-06-06
FileHash-MD5 6e1b219fc0db106ff3a6e982fb7b9241 2024-06-06
FileHash-MD5 7961263963841010a049265956b14666 2024-06-06