MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 076be35a474ae63c118b15aff7bcf2bb4d97e6887c67ad63a49b466370fbd3fe. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



YTStealer


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 076be35a474ae63c118b15aff7bcf2bb4d97e6887c67ad63a49b466370fbd3fe
SHA3-384 hash: bc20879e37000bd800989726f174c97e735cfc655b473206bc3783462706d15298e6ff74a2bac5b9d06ae134ec76737c
SHA1 hash: ecac2d4f0e3a5ca2b28fcc708721eccf5f842feb
MD5 hash: 55af18096fd31869ffca6567c206d9ab
humanhash: alanine-carpet-idaho-romeo
File name:gorilla99.exe
Download: download sample
Signature YTStealer
File size:4'488'192 bytes
First seen:2022-10-25 06:57:14 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9aebf3da4677af9275c461261e5abde3 (25 x YTStealer, 12 x CobaltStrike, 11 x Hive)
ssdeep 98304:spAfXrL+ayRQdWhnk6+5G7iQNVYkrvNntDM6dC1z47aiO3tFm:sQb8udEaPQNOcvNj01z47gt0
Threatray 101 similar samples on MalwareBazaar
TLSH T151263353A5AE45EAD2EB3EBDC630C6C4EB6FD42356F6A1B74284FB54C0B4E51C4DA200
TrID 64.7% (.EXE) UPX compressed Win64 Executable (70117/5/12)
25.0% (.EXE) UPX compressed Win32 Executable (27066/9/6)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.8% (.EXE) OS/2 Executable (generic) (2029/13)
1.8% (.EXE) Generic Win/DOS Executable (2002/3)
Reporter ankit_anubhav
Tags:exe YTStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
222
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
gorilla99.exe
Verdict:
No threats detected
Analysis date:
2022-10-25 06:59:35 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Launching a process
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Sending a custom TCP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spyw.evad
Score:
84 / 100
Signature
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Behaviour
Behavior Graph:
Threat name:
Win64.Infostealer.BroPass
Status:
Malicious
First seen:
2022-10-23 08:23:30 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
16 of 25 (64.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
spyware stealer upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Reads user/profile data of web browsers
UPX packed file
Unpacked files
SH256 hash:
e08d52d37a0eaa8bb7420ebc6a88c71ff0e2f01abc058cecb7978aa8b3be9ad0
MD5 hash:
a0decd75355331fb854cc9a2d696c05b
SHA1 hash:
4534c8b4017cfd3b008703c568d8e7cbe6310ae8
SH256 hash:
076be35a474ae63c118b15aff7bcf2bb4d97e6887c67ad63a49b466370fbd3fe
MD5 hash:
55af18096fd31869ffca6567c206d9ab
SHA1 hash:
ecac2d4f0e3a5ca2b28fcc708721eccf5f842feb
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments