General

  • Target

    0.rl.zip

  • Size

    5.0MB

  • MD5

    1a5487b8a0d56413d4f0b37ecd951475

  • SHA1

    87b68b50b1ecfa864f2a82b7fc6a9f3863f9eb27

  • SHA256

    7cc57f2d5d9d90e394221d3cd6c7e93efbf959696465dc491bbcc5644668b10f

  • SHA512

    0eb3221bbfddc876c79b45a90272f3812e8ee4e1e0a57ff295228ca6c34ecef67ad02e8bd8555875a8fa140a4412d177a2631cbde1b9ae179ecfc2c1b9e44401

  • SSDEEP

    98304:iwsiPp1baSpJxdFSaojTzrfALp5BmIafOMm27s9kIPEy2kjAPrwDG:KuaSjaPfGp5EI+OMhoY9kjAjwDG

Score
10/10

Malware Config

Signatures

  • YTStealer payload 1 IoCs
  • Ytstealer family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 0.rl.zip
    .zip

    Password: infected

  • 779d2613a2de90c7a385300e1667f63196af0bea.rl
    .exe windows x64

    Password: infected


    Headers

    Exports

    Sections