Analysis
-
max time kernel
165s -
max time network
179s -
platform
windows10_x64 -
resource
win10-20220414-en -
resource tags
arch:x64arch:x86image:win10-20220414-enlocale:en-usos:windows10-1703-x64system -
submitted
11/08/2022, 22:15
Behavioral task
behavioral1
Sample
ce53650a61d7bee5700e942f4682b6b56b2051ad89ba8d9d2c8a0d2164dff533.exe
Resource
win7-20220718-en
4 signatures
300 seconds
General
-
Target
ce53650a61d7bee5700e942f4682b6b56b2051ad89ba8d9d2c8a0d2164dff533.exe
-
Size
4.0MB
-
MD5
3bac181a69aaaeadc9de71837f9cfb07
-
SHA1
29938258ca919a00611f97d6fb0e6fc604c27348
-
SHA256
ce53650a61d7bee5700e942f4682b6b56b2051ad89ba8d9d2c8a0d2164dff533
-
SHA512
129efef5e662376738c2e1003f7d3346193c089b4accd5b47ed01debaeed1083d299d5eaca688cd901308d1b31bf29fae76e669e64883aa0cc120940beedd464
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral2/memory/936-119-0x0000000000850000-0x0000000001662000-memory.dmp family_ytstealer behavioral2/memory/936-120-0x0000000000850000-0x0000000001662000-memory.dmp family_ytstealer -
resource yara_rule behavioral2/memory/936-118-0x0000000000850000-0x0000000001662000-memory.dmp upx behavioral2/memory/936-119-0x0000000000850000-0x0000000001662000-memory.dmp upx behavioral2/memory/936-120-0x0000000000850000-0x0000000001662000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.