Analysis
-
max time kernel
2s -
max time network
168s -
platform
windows10-1703_x64 -
resource
win10-20220718-en -
resource tags
arch:x64arch:x86image:win10-20220718-enlocale:en-usos:windows10-1703-x64system -
submitted
20/07/2022, 07:29
Behavioral task
behavioral1
Sample
1E689CA8296EC484202E34A4A6BA366AA1F6CD0AD9DBB9A1D81851DD759905BA.exe
Resource
win7-20220718-en
6 signatures
300 seconds
General
-
Target
1E689CA8296EC484202E34A4A6BA366AA1F6CD0AD9DBB9A1D81851DD759905BA.exe
-
Size
4.0MB
-
MD5
1a29b82ff9b490de8c5964df0ba10012
-
SHA1
6cbf1ab13603f135de600bbb3f7faca39d79bc59
-
SHA256
1e689ca8296ec484202e34a4a6ba366aa1f6cd0ad9dbb9a1d81851dd759905ba
-
SHA512
c9b1043da408295370ad1b7db07fb7f0d69255585b67b6df9ed00738ad0160d7d10ca0f0bf2f43d41c0b4d4fb597d615f7e2b8035246f2674889430bae7d940f
Malware Config
Signatures
-
YTStealer payload 1 IoCs
resource yara_rule behavioral2/memory/3292-114-0x0000000001000000-0x0000000001DC8000-memory.dmp family_ytstealer -
resource yara_rule behavioral2/memory/3292-114-0x0000000001000000-0x0000000001DC8000-memory.dmp upx