Analysis
-
max time kernel
245s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/08/2022, 01:46
Behavioral task
behavioral1
Sample
4e9373930b2405ae8637b6471bfbb30f29721512ef3e2c6338192e6e20b137de.exe
Resource
win7-20220812-en
4 signatures
300 seconds
General
-
Target
4e9373930b2405ae8637b6471bfbb30f29721512ef3e2c6338192e6e20b137de.exe
-
Size
4.0MB
-
MD5
e19f0ace48615ef8fb7bc27b3677f1e4
-
SHA1
a106fa03e9076c7ef5c555edafb2db55b987ec1d
-
SHA256
4e9373930b2405ae8637b6471bfbb30f29721512ef3e2c6338192e6e20b137de
-
SHA512
28d4027a78ebf76abc8773c28b277ff24e3dfa32a496260d906ee676abe5c29e62f1ec0b81c09efd47cf28a51c130775357066d62d1ea3fcee41e2a0845aa2fb
-
SSDEEP
98304:76ZjstIPMoauNDjc/SXuDyzw0WenFTfDWoIi7Patk8Ml7LFx:7mQeXAetzw0hndbNIMEdMdFx
Malware Config
Signatures
-
YTStealer payload 3 IoCs
resource yara_rule behavioral1/memory/1808-54-0x0000000000870000-0x0000000001682000-memory.dmp family_ytstealer behavioral1/memory/1808-55-0x0000000000870000-0x0000000001682000-memory.dmp family_ytstealer behavioral1/memory/1808-56-0x0000000000870000-0x0000000001682000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1808-54-0x0000000000870000-0x0000000001682000-memory.dmp upx behavioral1/memory/1808-55-0x0000000000870000-0x0000000001682000-memory.dmp upx behavioral1/memory/1808-56-0x0000000000870000-0x0000000001682000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.