General
-
Target
Set_Yuki_x64.exe
-
Size
6.1MB
-
Sample
221111-ez875abafm
-
MD5
8a179d54a162d143f19fd7064e361c05
-
SHA1
4f0cd167e6c22efd4e31357de7e4c66625bf7032
-
SHA256
434f45359039b25ca4aaca82742c6a5f5317ad2a01c4146a53bc3fc5c2d7703b
-
SHA512
4112f0f510735b0aa72c2119310aa182354f8aa12d8b9ec4e0c6861de1dcffe4ef491b6e7399de66204e4f4d083f3e879d822a7f3dc7775b86b5c307245b9f16
-
SSDEEP
24576:uv66t3q/zhIYCpnviF18f5xn/T8BlnpvgSHhD:JsqlRuxn/T8j6s
Static task
static1
Behavioral task
behavioral1
Sample
Set_Yuki_x64.exe
Resource
win7-20220901-en
Malware Config
Extracted
vidar
55.6
1325
https://t.me/seclab_new
https://koyu.space/@ofade
-
profile_id
1325
Targets
-
-
Target
Set_Yuki_x64.exe
-
Size
6.1MB
-
MD5
8a179d54a162d143f19fd7064e361c05
-
SHA1
4f0cd167e6c22efd4e31357de7e4c66625bf7032
-
SHA256
434f45359039b25ca4aaca82742c6a5f5317ad2a01c4146a53bc3fc5c2d7703b
-
SHA512
4112f0f510735b0aa72c2119310aa182354f8aa12d8b9ec4e0c6861de1dcffe4ef491b6e7399de66204e4f4d083f3e879d822a7f3dc7775b86b5c307245b9f16
-
SSDEEP
24576:uv66t3q/zhIYCpnviF18f5xn/T8BlnpvgSHhD:JsqlRuxn/T8j6s
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-