Analysis
-
max time kernel
51s -
max time network
179s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
25/08/2022, 03:35
Behavioral task
behavioral1
Sample
9c599e95dbcedb3e4583f8ab321b97f1afe468b9104bf981c82b825e08770c57.exe
Resource
win7-20220812-en
4 signatures
300 seconds
General
-
Target
9c599e95dbcedb3e4583f8ab321b97f1afe468b9104bf981c82b825e08770c57.exe
-
Size
4.0MB
-
MD5
5e0c84f67f0e7050515cb78056c6f813
-
SHA1
f48e3fe96f438dda3fe66f091ffac71da85baa2f
-
SHA256
9c599e95dbcedb3e4583f8ab321b97f1afe468b9104bf981c82b825e08770c57
-
SHA512
3a7079ca83140af2d9da034b0b14c0df707727100aa9cd9840fff39cf63c66776c3f4a6c8bd55a4e0324e80470b63a025b72b83b0cd236d5d7d8ffade45e238b
-
SSDEEP
49152:sfy2P2DaVPl0fAPIlXX+mLFjRCStbKPI9lIxa5m9bPoUOobnWqX1QORP0liB:sPGEltqRL9tbe45IroUOodM
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral2/memory/2700-116-0x0000000000CE0000-0x0000000001AF4000-memory.dmp family_ytstealer behavioral2/memory/2700-117-0x0000000000CE0000-0x0000000001AF4000-memory.dmp family_ytstealer -
resource yara_rule behavioral2/memory/2700-115-0x0000000000CE0000-0x0000000001AF4000-memory.dmp upx behavioral2/memory/2700-116-0x0000000000CE0000-0x0000000001AF4000-memory.dmp upx behavioral2/memory/2700-117-0x0000000000CE0000-0x0000000001AF4000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.