Analysis
-
max time kernel
69s -
max time network
92s -
platform
windows10_x64 -
resource
win10-20220414-en -
resource tags
arch:x64arch:x86image:win10-20220414-enlocale:en-usos:windows10-1703-x64system -
submitted
20/07/2022, 07:33
Behavioral task
behavioral1
Sample
243BACA4A8F3AC352178DE14A7E42CB8C7EFD6C9FB28B69F02D74C94C01E3D5E.exe
Resource
win7-20220718-en
6 signatures
300 seconds
General
-
Target
243BACA4A8F3AC352178DE14A7E42CB8C7EFD6C9FB28B69F02D74C94C01E3D5E.exe
-
Size
4.0MB
-
MD5
4d0c2d3161793029bd7dbdfd94488430
-
SHA1
fdc170777583a1c6a7d0d4608bddce96017bb0b6
-
SHA256
243baca4a8f3ac352178de14a7e42cb8c7efd6c9fb28b69f02d74c94c01e3d5e
-
SHA512
e1104d1f4cde400de14c23ade666c92ddc2af967d78d014a7d89ca687b70ac593546ea30f10d83842823d1feeb57d7ae18b4ffce21eb7f8ce53f04787a69c2ab
Malware Config
Signatures
-
YTStealer payload 1 IoCs
resource yara_rule behavioral2/memory/412-118-0x0000000000F10000-0x0000000001CD9000-memory.dmp family_ytstealer -
resource yara_rule behavioral2/memory/412-118-0x0000000000F10000-0x0000000001CD9000-memory.dmp upx