Technical Analysis & Remediations
MITRE ATT&CK Mapping
T1078 Valid Accounts
Suspected initial access via stolen credentials.
T1046 Network Service Discovery
Usage of SoftPerfect NetScan and NetExec.
T1550.002 Use Alternate Authentication Material
Pass the Hash: Evidenced by Invoke-TheHash.ps1 and Rubeus.exe.bak.
T1562.001 Impair Defenses
Disable or Modify Tools: FixingIssues2.ps1 targets Windows Defender and disables System Restore via Group Policy.
T1490 Inhibit System Recovery
Execution of "vssadmin delete shadows /all /quiet".
T1546.003 Event Triggered Execution
Windows Management Instrumentation Event Subscription: Vecna.ps1 establishes persistence via WMI to execute the ransomware binary.
T1486 Data Encrypted for Impact
The final payload, StrangerThings[.]exe, is the Golang-based Yurei ransomware.
CVE Profile
N/A (Exploitation of specific CVEs is not detailed in the source telemetry; the attack relies heavily on credential abuse and Living off the Land (LotL) techniques).
Telemetry
IPs
44.210.101[.]86
44.223.40[.]182 (AS14618 - Amazon).
Hashes (SHA256)
1facf7cdd94eed0a8a11b30f4237699385b20578339c68df01e542d772ccbce5 (Host_Discovery.ps1).
ebfe75ab3223b036a4b886d497f2b172425b3e63890d485c99353773d4c436ea (FixingIssues2.ps1).
4f88d3977a24fb160fc3ba69821287a197ae9b04493d705dc2fe939442ba6461 (StrangerThings[.]exe).
Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)
GOVERN (GV) – Crisis Management & Oversight
Command
Integrate Yurei IOCs and associated LotL binary profiles into the organizational threat intelligence platform.
DETECT (DE) – Monitoring & Analysis
Command
Implement SIEM alerts for vssadmin delete shadows commands and unauthorized usage of AnyDesk[.]exe, Everything[.]exe, and PsExec.
Command
Hunt for WMI persistence mechanisms matching the behavior of Vecna.ps1, specifically looking for triggers tied to explorer.exe startup.
RESPOND (RS) – Mitigation & Containment
Command
Block inbound/outbound communications to AWS IPs 44.210.101[.]86 and 44.223.40[.]182.
Command
Isolate endpoints exhibiting rapid internal scanning behavior (resembling NetScan/NetExec activity) or unauthorized modifications to Windows Defender exclusions.
RECOVER (RC) – Restoration & Trust
Command
Ensure offline, immutable backups are maintained, as the adversary actively disables System Restore and deletes shadow copies.
IDENTIFY & PROTECT (ID/PR) – The Feedback Loop
Command
Enforce MFA across all remote access and VPN portals to mitigate the risk of initial access via stolen infostealer logs.
Command
Restrict the execution of PowerShell scripts (.ps1) to signed, administrative operations only.
Remediation - THE HOME USER TRACK (Safety Focus)
Priority 1: Safety
Command
If you suspect a Yurei infection, disconnect from the internet immediately to prevent the exfiltration of your data (the "double extortion" aspect).
Command
Do not log into banking/email until the device is verified clean.
Priority 2: Identity
Command
Since the attackers likely use stolen passwords from "infostealer logs," change critical passwords using a known clean device.
Priority 3: Persistence
Command
Verify that your Windows Defender settings have not been tampered with (e.g., exclusions added for the entire C:\ drive), as the attackers use scripts to silently disable security features.
Hardening & References
Baseline
CIS Microsoft Windows Desktop/Server Benchmarks (Focus: PowerShell Execution Policies, Credential Guard, LSA Protection).
Framework
NIST CSF 2.0 / SP 800-61r3.
Source
Team Cymru