Analysis
-
max time kernel
51s -
max time network
178s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
30/08/2022, 02:12
Behavioral task
behavioral1
Sample
9d82d028b5141a16ee0db50eab48694827bc4dc629e5d980b205d2687e232288.exe
Resource
win7-20220812-en
4 signatures
300 seconds
General
-
Target
9d82d028b5141a16ee0db50eab48694827bc4dc629e5d980b205d2687e232288.exe
-
Size
4.0MB
-
MD5
1f3c5bbfec2ba90b7b59b11a2bcf4ca6
-
SHA1
1f7ed4be9df1fd248d60fbb15fca1931d6759e50
-
SHA256
9d82d028b5141a16ee0db50eab48694827bc4dc629e5d980b205d2687e232288
-
SHA512
d79367f409c8434481b05c36bd7b865fbf93bb7eafbbe48889b28cd4d9952707bb1632583d67405d4549049be1c6336352ad0586480ac08a1c46fc6ed2ac006b
-
SSDEEP
98304:xFMNtfOfcFldIVz791+ioQuE446WPQucT2Ju069:DMVCCiQOAEJu5
Malware Config
Signatures
-
YTStealer payload 3 IoCs
resource yara_rule behavioral2/memory/1572-120-0x0000000000E10000-0x0000000001C22000-memory.dmp family_ytstealer behavioral2/memory/1572-121-0x0000000000E10000-0x0000000001C22000-memory.dmp family_ytstealer behavioral2/memory/1572-122-0x0000000000E10000-0x0000000001C22000-memory.dmp family_ytstealer -
resource yara_rule behavioral2/memory/1572-120-0x0000000000E10000-0x0000000001C22000-memory.dmp upx behavioral2/memory/1572-121-0x0000000000E10000-0x0000000001C22000-memory.dmp upx behavioral2/memory/1572-122-0x0000000000E10000-0x0000000001C22000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.