Analysis

  • max time kernel
    69s
  • max time network
    92s
  • platform
    windows10_x64
  • resource
    win10-20220414-en
  • resource tags

    arch:x64arch:x86image:win10-20220414-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20/07/2022, 07:33

General

  • Target

    243BACA4A8F3AC352178DE14A7E42CB8C7EFD6C9FB28B69F02D74C94C01E3D5E.exe

  • Size

    4.0MB

  • MD5

    4d0c2d3161793029bd7dbdfd94488430

  • SHA1

    fdc170777583a1c6a7d0d4608bddce96017bb0b6

  • SHA256

    243baca4a8f3ac352178de14a7e42cb8c7efd6c9fb28b69f02d74c94c01e3d5e

  • SHA512

    e1104d1f4cde400de14c23ade666c92ddc2af967d78d014a7d89ca687b70ac593546ea30f10d83842823d1feeb57d7ae18b4ffce21eb7f8ce53f04787a69c2ab

Score
10/10

Malware Config

Signatures

  • YTStealer

    YTStealer is a malware designed to steal YouTube authentication cookies.

  • YTStealer payload 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\243BACA4A8F3AC352178DE14A7E42CB8C7EFD6C9FB28B69F02D74C94C01E3D5E.exe
    "C:\Users\Admin\AppData\Local\Temp\243BACA4A8F3AC352178DE14A7E42CB8C7EFD6C9FB28B69F02D74C94C01E3D5E.exe"
    1⤵
      PID:412

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/412-118-0x0000000000F10000-0x0000000001CD9000-memory.dmp

      Filesize

      13.8MB