Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
31-08-2022 20:26
Behavioral task
behavioral1
Sample
0099da3acbf4982f1d1ad92978afa3aa38d17258.exe
Resource
win7-20220812-en
3 signatures
150 seconds
General
-
Target
0099da3acbf4982f1d1ad92978afa3aa38d17258.exe
-
Size
14.3MB
-
MD5
72583f976568e39c772c67962c9aeb36
-
SHA1
0099da3acbf4982f1d1ad92978afa3aa38d17258
-
SHA256
f1a438dc4bc7a96919c5a4d84a999cf22a69a50d17920ac23ab462a7c6be70ab
-
SHA512
9c2d9ef6c95732559ad83cd244e8981c8e5428bdb833a72ebab5c723ebd3e0f236f16a0d99a93390b2d451c03d699c6311a341a0f8267154da932d3922275bce
-
SSDEEP
98304:Vr0ZHdsGv80rd/ISan4iy9fEqEjF/EZUjMsHC9VZS/gE:89vnO39GVJ
Malware Config
Signatures
-
YTStealer payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1824-54-0x0000000001220000-0x0000000002072000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/1824-54-0x0000000001220000-0x0000000002072000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1824-54-0x0000000001220000-0x0000000002072000-memory.dmpFilesize
14.3MB