General

  • Target

    3D948E39198A851D73337EDE0025543F4833ECC0F8B88F61C5F4CE8EF643908F

  • Size

    4.0MB

  • Sample

    220812-hsdpesaadn

  • MD5

    c8285db83bfd7f5dec56f11b4686ed6c

  • SHA1

    46ff3a7cfbcd6a37ee30e22c363cfa57d98e333a

  • SHA256

    3d948e39198a851d73337ede0025543f4833ecc0f8b88f61c5f4ce8ef643908f

  • SHA512

    952a6c241662444dc1cd8dd116ff098cb17e700be7a8ea55d67f74d84c84cdf45579f35f2774992039a397353736e14ddea3f5d9906b6d4a48f78ca140375ff9

Malware Config

Targets

    • Target

      3D948E39198A851D73337EDE0025543F4833ECC0F8B88F61C5F4CE8EF643908F

    • Size

      4.0MB

    • MD5

      c8285db83bfd7f5dec56f11b4686ed6c

    • SHA1

      46ff3a7cfbcd6a37ee30e22c363cfa57d98e333a

    • SHA256

      3d948e39198a851d73337ede0025543f4833ecc0f8b88f61c5f4ce8ef643908f

    • SHA512

      952a6c241662444dc1cd8dd116ff098cb17e700be7a8ea55d67f74d84c84cdf45579f35f2774992039a397353736e14ddea3f5d9906b6d4a48f78ca140375ff9

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks