Analysis
-
max time kernel
165s -
max time network
176s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
15-09-2022 03:33
Behavioral task
behavioral1
Sample
a9b558e1658ccc50bd076c98f0cb14ff4e5702982cc14f918b4bcee8e96c0540.exe
Resource
win7-20220812-en
4 signatures
300 seconds
General
-
Target
a9b558e1658ccc50bd076c98f0cb14ff4e5702982cc14f918b4bcee8e96c0540.exe
-
Size
4.0MB
-
MD5
ebb3266a17a113966611ffa1dbc9e9e5
-
SHA1
39f8c4469b92cea5532cab0e2e1b1893f0b6a6cf
-
SHA256
a9b558e1658ccc50bd076c98f0cb14ff4e5702982cc14f918b4bcee8e96c0540
-
SHA512
1cf6f32463bb9e8c5827e159364519de33f55a9af365b574f0d28174036e64e8eba8646993439b76442fbcf02c1e267b93e08567edc2db81de854a5f79f2dc3e
-
SSDEEP
98304:Lw9z502/GG+Lf0wDeRhB/szdUvTKJqZIFRSYtp2oAN:89z50mt+Lf0EeRhx2dKmAIkN
Malware Config
Signatures
-
YTStealer payload 3 IoCs
resource yara_rule behavioral2/memory/2960-116-0x00000000010B0000-0x0000000001EC2000-memory.dmp family_ytstealer behavioral2/memory/2960-117-0x00000000010B0000-0x0000000001EC2000-memory.dmp family_ytstealer behavioral2/memory/2960-118-0x00000000010B0000-0x0000000001EC2000-memory.dmp family_ytstealer -
resource yara_rule behavioral2/memory/2960-116-0x00000000010B0000-0x0000000001EC2000-memory.dmp upx behavioral2/memory/2960-117-0x00000000010B0000-0x0000000001EC2000-memory.dmp upx behavioral2/memory/2960-118-0x00000000010B0000-0x0000000001EC2000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.