Analysis
-
max time kernel
144s -
max time network
180s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
30/08/2022, 01:39
Behavioral task
behavioral1
Sample
3cd5bc5b91ff8874ad5d910565968043d953cc692cdcef04a6d44e0b21aeb5af.exe
Resource
win7-20220812-en
4 signatures
300 seconds
General
-
Target
3cd5bc5b91ff8874ad5d910565968043d953cc692cdcef04a6d44e0b21aeb5af.exe
-
Size
4.0MB
-
MD5
52d6445f5273f5419bf0306f93ae658b
-
SHA1
19801c3935a8472eea671e3333aadfa8b088d2c2
-
SHA256
3cd5bc5b91ff8874ad5d910565968043d953cc692cdcef04a6d44e0b21aeb5af
-
SHA512
45767cf8001455d01bf726d1e4566a7ac2881c033d9844375990543b3e71fc1a2ea46789dfcc6f556c5aeb6d15e2296d06ec87a1491a28546ff7cf0ce1a2c176
-
SSDEEP
98304:3M5NS14Q9UVfHdfx2/XNZhc4VeGXpRfGxCDTD4B/x8gqlJ8v+ZxU:INS14Qm59fmfhB8G5EiTDy8g8JJZxU
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral2/memory/3676-119-0x0000000000D60000-0x0000000001B72000-memory.dmp family_ytstealer behavioral2/memory/3676-120-0x0000000000D60000-0x0000000001B72000-memory.dmp family_ytstealer -
resource yara_rule behavioral2/memory/3676-118-0x0000000000D60000-0x0000000001B72000-memory.dmp upx behavioral2/memory/3676-119-0x0000000000D60000-0x0000000001B72000-memory.dmp upx behavioral2/memory/3676-120-0x0000000000D60000-0x0000000001B72000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.