General

  • Target

    YuzuModDownloader.exe

  • Size

    36.3MB

  • Sample

    230911-kxetdsfa53

  • MD5

    24de733c554e4e70989b1ad2d29c049b

  • SHA1

    1cce7d5fe43fb34266adba2f638b17cb7265d72a

  • SHA256

    168e1b8c51846695fc0cf65051b88085465e7e64bf6e2e770af5fb7abcd3ce55

  • SHA512

    bd04e8da1329d390703841bb6693cbb414bb5ebecad715f341af23c9f3d3810583552fb208f5728700a9cbd51b0aeeec0f8c2385745c758ae4526a08642fd553

  • SSDEEP

    393216:RatW17zliqbdWPjsO3GLpsupRnt4+JcYcfkc1DX5Gp:yskqdWLs118RYcfkc1j+

Score
9/10

Malware Config

Targets

    • Target

      YuzuModDownloader.exe

    • Size

      36.3MB

    • MD5

      24de733c554e4e70989b1ad2d29c049b

    • SHA1

      1cce7d5fe43fb34266adba2f638b17cb7265d72a

    • SHA256

      168e1b8c51846695fc0cf65051b88085465e7e64bf6e2e770af5fb7abcd3ce55

    • SHA512

      bd04e8da1329d390703841bb6693cbb414bb5ebecad715f341af23c9f3d3810583552fb208f5728700a9cbd51b0aeeec0f8c2385745c758ae4526a08642fd553

    • SSDEEP

      393216:RatW17zliqbdWPjsO3GLpsupRnt4+JcYcfkc1DX5Gp:yskqdWLs118RYcfkc1j+

    Score
    7/10
    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Tasks