General
-
Target
cf69dfc3fe68b55656f7851286256c1518a96cc57fa0edbc1e6362a3195ecba6
-
Size
174KB
-
Sample
220805-z826dshdh4
-
MD5
81305c1d38dac02e66a7eeb2c652614e
-
SHA1
5937f3039aa6ad0ad4bbd1f1d539c675fe3a8c4d
-
SHA256
cf69dfc3fe68b55656f7851286256c1518a96cc57fa0edbc1e6362a3195ecba6
-
SHA512
494ba874dd1e7db7008ddf619260fab6c1d9714341136a3bd5231d5e5cf191f484103ab1c0c2ac00492235e16fb5f5e4bc844c3de086d52aaea6616262e45e72
Static task
static1
Malware Config
Targets
-
-
Target
cf69dfc3fe68b55656f7851286256c1518a96cc57fa0edbc1e6362a3195ecba6
-
Size
174KB
-
MD5
81305c1d38dac02e66a7eeb2c652614e
-
SHA1
5937f3039aa6ad0ad4bbd1f1d539c675fe3a8c4d
-
SHA256
cf69dfc3fe68b55656f7851286256c1518a96cc57fa0edbc1e6362a3195ecba6
-
SHA512
494ba874dd1e7db7008ddf619260fab6c1d9714341136a3bd5231d5e5cf191f484103ab1c0c2ac00492235e16fb5f5e4bc844c3de086d52aaea6616262e45e72
-
YTStealer payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-