Analysis
-
max time kernel
245s -
max time network
268s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 01:36
Behavioral task
behavioral1
Sample
335f495592e225ee8e777f86520c3ddb75e8f47a3188e51c3b506384163b7fd3.exe
Resource
win7-20220812-en
4 signatures
300 seconds
General
-
Target
335f495592e225ee8e777f86520c3ddb75e8f47a3188e51c3b506384163b7fd3.exe
-
Size
4.0MB
-
MD5
a757d0237845c5018e819b6616890571
-
SHA1
66a735e22839111e3e93dd81c629c2fc732dab8e
-
SHA256
335f495592e225ee8e777f86520c3ddb75e8f47a3188e51c3b506384163b7fd3
-
SHA512
d97a4ce7c003fd37d91c8c692b1453c0cd82568fe434efd642bc3cc628a1ab632826de1228db7bd58f84b95c349a2baa39aca964b26347d087ae6102e0cd2e7f
-
SSDEEP
98304:er/kLepiUl9SkI0CNgI1nJ4Dn/ljyAVwqSFW56J2oPJ:ersLepXd/I1niTBzw7WgMoR
Malware Config
Signatures
-
YTStealer payload 3 IoCs
resource yara_rule behavioral1/memory/2000-54-0x0000000000DA0000-0x0000000001BB4000-memory.dmp family_ytstealer behavioral1/memory/2000-55-0x0000000000DA0000-0x0000000001BB4000-memory.dmp family_ytstealer behavioral1/memory/2000-56-0x0000000000DA0000-0x0000000001BB4000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/2000-54-0x0000000000DA0000-0x0000000001BB4000-memory.dmp upx behavioral1/memory/2000-55-0x0000000000DA0000-0x0000000001BB4000-memory.dmp upx behavioral1/memory/2000-56-0x0000000000DA0000-0x0000000001BB4000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.