Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2022, 07:59
Behavioral task
behavioral1
Sample
4a574c8f0a8714832f75952af36eb61c2713d04ccb06639956b4ad4d75f9565a.exe
Resource
win7-20220715-en
5 signatures
150 seconds
General
-
Target
4a574c8f0a8714832f75952af36eb61c2713d04ccb06639956b4ad4d75f9565a.exe
-
Size
4.3MB
-
MD5
40994e68a8b5a3c3ba777e52230dc796
-
SHA1
b7e84b45fe0e3144bbe96b0dc9c7318665345102
-
SHA256
4a574c8f0a8714832f75952af36eb61c2713d04ccb06639956b4ad4d75f9565a
-
SHA512
13960eb245c7252be641f7d98dfb8a77144dc52184a04cd3d341e3b1e4ed31dc36fb52b09a72e43e28f9792acc393b255a61b4416abc422c4a6c7591dc3ae22c
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral2/memory/984-131-0x00007FF7B0550000-0x00007FF7B138D000-memory.dmp family_ytstealer behavioral2/memory/984-132-0x00007FF7B0550000-0x00007FF7B138D000-memory.dmp family_ytstealer -
resource yara_rule behavioral2/memory/984-130-0x00007FF7B0550000-0x00007FF7B138D000-memory.dmp upx behavioral2/memory/984-131-0x00007FF7B0550000-0x00007FF7B138D000-memory.dmp upx behavioral2/memory/984-132-0x00007FF7B0550000-0x00007FF7B138D000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs