Analysis
-
max time kernel
144s -
max time network
184s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
30/08/2022, 02:08
Behavioral task
behavioral1
Sample
88e20ad657048d5785d55070bd21f1c6a7a13624f4e2f87401c2bdb0906632cf.exe
Resource
win7-20220812-en
4 signatures
300 seconds
General
-
Target
88e20ad657048d5785d55070bd21f1c6a7a13624f4e2f87401c2bdb0906632cf.exe
-
Size
4.0MB
-
MD5
5b1ff119e06ec333adc1f284581ef7b1
-
SHA1
f3623b92f1d71ccb40e64504c46523dfc36ff702
-
SHA256
88e20ad657048d5785d55070bd21f1c6a7a13624f4e2f87401c2bdb0906632cf
-
SHA512
61e9095a608fc789ba5c53ac0c5fbe17cbedf4e488e9e55ac799dd50fc530c7d4bdf4d2bc151b035f32872cf586ed560765bfca94fe73bd6d2b36e8ebe728575
-
SSDEEP
98304:jDDKgjzKxYXmWdWvJN23D65qCLWcnx85qhLWuISNCQJN3:HmgjuxtLx8m5pWUeCHNCQP3
Malware Config
Signatures
-
YTStealer payload 3 IoCs
resource yara_rule behavioral2/memory/2432-116-0x0000000001170000-0x0000000001F81000-memory.dmp family_ytstealer behavioral2/memory/2432-117-0x0000000001170000-0x0000000001F81000-memory.dmp family_ytstealer behavioral2/memory/2432-118-0x0000000001170000-0x0000000001F81000-memory.dmp family_ytstealer -
resource yara_rule behavioral2/memory/2432-116-0x0000000001170000-0x0000000001F81000-memory.dmp upx behavioral2/memory/2432-117-0x0000000001170000-0x0000000001F81000-memory.dmp upx behavioral2/memory/2432-118-0x0000000001170000-0x0000000001F81000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.