General

  • Target

    2DE30730384DDD5308A00959BBE5CED3F24228210884DDB0AC5361361073EA62

  • Size

    4.0MB

  • Sample

    220812-hqq7qsaabj

  • MD5

    cfc4a93268351ebfa38d09ef8614255c

  • SHA1

    8af51e00ca1befbcca87db33ec64546e6c275b8b

  • SHA256

    2de30730384ddd5308a00959bbe5ced3f24228210884ddb0ac5361361073ea62

  • SHA512

    15652d129202e32835e19cfa34aa31f783c666e65f325868f587ec1d685e1bb3e8607ecb5e5eee7b2f829aed8ef1441a8cf4437789aa13431c91046a9a81d532

Malware Config

Targets

    • Target

      2DE30730384DDD5308A00959BBE5CED3F24228210884DDB0AC5361361073EA62

    • Size

      4.0MB

    • MD5

      cfc4a93268351ebfa38d09ef8614255c

    • SHA1

      8af51e00ca1befbcca87db33ec64546e6c275b8b

    • SHA256

      2de30730384ddd5308a00959bbe5ced3f24228210884ddb0ac5361361073ea62

    • SHA512

      15652d129202e32835e19cfa34aa31f783c666e65f325868f587ec1d685e1bb3e8607ecb5e5eee7b2f829aed8ef1441a8cf4437789aa13431c91046a9a81d532

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks