Analysis
-
max time kernel
56s -
max time network
183s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
30/08/2022, 01:46
Behavioral task
behavioral1
Sample
50f6ed33ecbfe835cd69ad989fca695b815b187d967366ed9db8533d834e9e82.exe
Resource
win7-20220812-en
4 signatures
300 seconds
General
-
Target
50f6ed33ecbfe835cd69ad989fca695b815b187d967366ed9db8533d834e9e82.exe
-
Size
4.0MB
-
MD5
cd5c221c4973b7f1c136184689618f7f
-
SHA1
722e60ffc5bacccd3fc8232e2d5620a57aba541a
-
SHA256
50f6ed33ecbfe835cd69ad989fca695b815b187d967366ed9db8533d834e9e82
-
SHA512
973a14e40c9e4c82bedde1900edf2f420a6cc90f5531f1f2f538fa44350fe6b33bda87b0835945cb790f2f46966d9b4fe2db84ecb2574e418352c2d6d44aa73e
-
SSDEEP
98304:r/1N2AZDM1ocWSOM4eT1MYqtV0QIBB5EQyONrSyK945uN5ubidqqQQr/D:rdEQDMUZiTGY4bIBB5XyONrVRuNSid9r
Malware Config
Signatures
-
YTStealer payload 3 IoCs
resource yara_rule behavioral2/memory/2700-116-0x0000000000D40000-0x0000000001B52000-memory.dmp family_ytstealer behavioral2/memory/2700-117-0x0000000000D40000-0x0000000001B52000-memory.dmp family_ytstealer behavioral2/memory/2700-118-0x0000000000D40000-0x0000000001B52000-memory.dmp family_ytstealer -
resource yara_rule behavioral2/memory/2700-116-0x0000000000D40000-0x0000000001B52000-memory.dmp upx behavioral2/memory/2700-117-0x0000000000D40000-0x0000000001B52000-memory.dmp upx behavioral2/memory/2700-118-0x0000000000D40000-0x0000000001B52000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.