Analysis
-
max time kernel
54s -
max time network
180s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
30/08/2022, 01:27
Behavioral task
behavioral1
Sample
2537af94a4828edf5b859e4af8ddad46d740b317e7812c30f7402ac55f64f2e9.exe
Resource
win7-20220812-en
4 signatures
300 seconds
General
-
Target
2537af94a4828edf5b859e4af8ddad46d740b317e7812c30f7402ac55f64f2e9.exe
-
Size
4.0MB
-
MD5
dbdabe272ad89931f5b26ccf4c5ef13a
-
SHA1
a1fa77240cb17b2eda490487de1f45c7f4f4494f
-
SHA256
2537af94a4828edf5b859e4af8ddad46d740b317e7812c30f7402ac55f64f2e9
-
SHA512
2a497a39ee5dec27af691a848efe6cb33dbc8efd63fa91b9f552dd9eb5b638c81aee5d39f234df35cc5507f6b6810a8938e90c3ff60ee27d8adbc308cda6cf7f
-
SSDEEP
98304:u/I3jX6m/pmTq8V0hXDPFofiKfA7MHylLL/El+NU:u/SjXxZ8V0lFbKfA7PlHE8N
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral2/memory/1868-121-0x0000000000F20000-0x0000000001D34000-memory.dmp family_ytstealer behavioral2/memory/1868-122-0x0000000000F20000-0x0000000001D34000-memory.dmp family_ytstealer -
resource yara_rule behavioral2/memory/1868-120-0x0000000000F20000-0x0000000001D34000-memory.dmp upx behavioral2/memory/1868-121-0x0000000000F20000-0x0000000001D34000-memory.dmp upx behavioral2/memory/1868-122-0x0000000000F20000-0x0000000001D34000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.