Analysis
-
max time kernel
249s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15-09-2022 03:34
Behavioral task
behavioral1
Sample
bcf34e8cace1019595951cd92f2e72dc3ebf56d9e3da60bf154016c0eb39679f.exe
Resource
win7-20220812-en
4 signatures
300 seconds
General
-
Target
bcf34e8cace1019595951cd92f2e72dc3ebf56d9e3da60bf154016c0eb39679f.exe
-
Size
4.0MB
-
MD5
bf9d64304766018088b496f834a90e63
-
SHA1
80eb5b8cca94cf12b2cbc0ecd7bafe6026f551de
-
SHA256
bcf34e8cace1019595951cd92f2e72dc3ebf56d9e3da60bf154016c0eb39679f
-
SHA512
937318853f2b1d826e829c13f84a0f080f9d91127489ff56b81488b2bece85bcb225dd34f76a3ce66039e9d42ee2de8dd53f524231c07847f71cb138c14d3367
-
SSDEEP
98304:t+bUNEK+/h612B67IvZLpkAsb20j4UW1CRK:gDZ68sIRdP423UW1C
Malware Config
Signatures
-
YTStealer payload 3 IoCs
resource yara_rule behavioral1/memory/1096-54-0x0000000000AB0000-0x00000000018C2000-memory.dmp family_ytstealer behavioral1/memory/1096-55-0x0000000000AB0000-0x00000000018C2000-memory.dmp family_ytstealer behavioral1/memory/1096-56-0x0000000000AB0000-0x00000000018C2000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1096-54-0x0000000000AB0000-0x00000000018C2000-memory.dmp upx behavioral1/memory/1096-55-0x0000000000AB0000-0x00000000018C2000-memory.dmp upx behavioral1/memory/1096-56-0x0000000000AB0000-0x00000000018C2000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.