General

  • Target

    youtube_viewer.exe

  • Size

    19.8MB

  • Sample

    221123-m4wrlaah9t

  • MD5

    2b0314b3e894dc47190a629d1e1ab00a

  • SHA1

    f70e66b8be1659c4e4bd0a876aa30c2e25d71c85

  • SHA256

    e9f46e38e531083852aba0d79b6f469d59662e4a84079697064be1724109a729

  • SHA512

    2ebde325c7caf32e03055e56155eb7b6c8630520098dd43d7c5d81c8e257049c95de48426847710711694b61b0fd8e108e9e08cc74128ce95a67bfc3ae8abf38

  • SSDEEP

    393216:7OnzJvaCnc+/m3pGH07mgSvInAvheV2BUvNB9dDGr:74NiCndKGH07xSQAZeVtNN6r

Malware Config

Targets

    • Target

      youtube_viewer.exe

    • Size

      19.8MB

    • MD5

      2b0314b3e894dc47190a629d1e1ab00a

    • SHA1

      f70e66b8be1659c4e4bd0a876aa30c2e25d71c85

    • SHA256

      e9f46e38e531083852aba0d79b6f469d59662e4a84079697064be1724109a729

    • SHA512

      2ebde325c7caf32e03055e56155eb7b6c8630520098dd43d7c5d81c8e257049c95de48426847710711694b61b0fd8e108e9e08cc74128ce95a67bfc3ae8abf38

    • SSDEEP

      393216:7OnzJvaCnc+/m3pGH07mgSvInAvheV2BUvNB9dDGr:74NiCndKGH07xSQAZeVtNN6r

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks