Analysis

  • max time kernel
    140s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-08-2022 20:26

General

  • Target

    0099da3acbf4982f1d1ad92978afa3aa38d17258.exe

  • Size

    14.3MB

  • MD5

    72583f976568e39c772c67962c9aeb36

  • SHA1

    0099da3acbf4982f1d1ad92978afa3aa38d17258

  • SHA256

    f1a438dc4bc7a96919c5a4d84a999cf22a69a50d17920ac23ab462a7c6be70ab

  • SHA512

    9c2d9ef6c95732559ad83cd244e8981c8e5428bdb833a72ebab5c723ebd3e0f236f16a0d99a93390b2d451c03d699c6311a341a0f8267154da932d3922275bce

  • SSDEEP

    98304:Vr0ZHdsGv80rd/ISan4iy9fEqEjF/EZUjMsHC9VZS/gE:89vnO39GVJ

Score
10/10

Malware Config

Signatures

  • YTStealer

    YTStealer is a malware designed to steal YouTube authentication cookies.

  • YTStealer payload 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0099da3acbf4982f1d1ad92978afa3aa38d17258.exe
    "C:\Users\Admin\AppData\Local\Temp\0099da3acbf4982f1d1ad92978afa3aa38d17258.exe"
    1⤵
      PID:2432

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2432-132-0x00000000000C0000-0x0000000000F12000-memory.dmp
      Filesize

      14.3MB