Analysis
-
max time kernel
177s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2022 15:07
Behavioral task
behavioral1
Sample
779d2613a2de90c7a385300e1667f63196af0bea.exe
Resource
win7-20220718-en
windows7-x64
3 signatures
150 seconds
General
-
Target
779d2613a2de90c7a385300e1667f63196af0bea.exe
-
Size
14.1MB
-
MD5
6f249119c8be8db6aa938cd22171f497
-
SHA1
779d2613a2de90c7a385300e1667f63196af0bea
-
SHA256
d4fe59e3da719ae845c192e495ac3127b702c165cff923adabff67406bcd46eb
-
SHA512
c7e41f69ca4341156af1c30d473a13f93f69066532619c894940d7b9845c695cb5356fbd3a27af2aad61c4ccc44a8b189bdb348db399018bb6e78580d583e957
Malware Config
Signatures
-
YTStealer payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5096-130-0x0000000000020000-0x0000000000E37000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral2/memory/5096-130-0x0000000000020000-0x0000000000E37000-memory.dmp upx