General

  • Target

    c8434e5546f62440bcc26ce8b1b620d7772e44630893e3b5d06e8ad4e113d55b.rl.zip

  • Size

    5.0MB

  • MD5

    dedc25da6e88560309c8e72af753abff

  • SHA1

    498e24b336f937a495fd2c678a1cefad00ef2a65

  • SHA256

    53f838b7dd1eca1ba0fb9f7accf923d613eae20ebd81647179d356ff201f2458

  • SHA512

    54fcc11cc8d6e59c25b15f1dbaf954bb96732d86367820aeb68247e82f1cdec8c363d24b0f24410e9a87698bd1e6cca5bd80948cf84288baac0a3b2fa89faef1

  • SSDEEP

    98304:isAtOPzEtdVp8laL9ob8Lp0/vDHNQjTMjlS2YHtP6/5W6iWRJaCy9w5sgq:iKL8p66obYYvDZlpBT9Jp1q

Score
10/10

Malware Config

Signatures

  • YTStealer payload 1 IoCs
  • Ytstealer family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • c8434e5546f62440bcc26ce8b1b620d7772e44630893e3b5d06e8ad4e113d55b.rl.zip
    .zip

    Password: infected

  • 0099da3acbf4982f1d1ad92978afa3aa38d17258.rl
    .exe windows x64

    Password: infected


    Headers

    Exports

    Sections