General

  • Target

    6CA42861F2ABD2C81D9652A26349E9121F475D004935882E1BC555406C4EFAB4

  • Size

    4.0MB

  • Sample

    220812-hvthnaaafq

  • MD5

    4945783940926753d62da3141229556a

  • SHA1

    3562e7321cf516d390af1e877d2a249d5e7d405f

  • SHA256

    6ca42861f2abd2c81d9652a26349e9121f475d004935882e1bc555406c4efab4

  • SHA512

    eae1595039b6aa1719cf8195adfe0f05cfa4dde1d8f6cd66e7757fbf3757a3c61b35d743e3d39d0672e869dc72d625b8c9b73b8905c1043eaf7f396d5757bb97

Malware Config

Targets

    • Target

      6CA42861F2ABD2C81D9652A26349E9121F475D004935882E1BC555406C4EFAB4

    • Size

      4.0MB

    • MD5

      4945783940926753d62da3141229556a

    • SHA1

      3562e7321cf516d390af1e877d2a249d5e7d405f

    • SHA256

      6ca42861f2abd2c81d9652a26349e9121f475d004935882e1bc555406c4efab4

    • SHA512

      eae1595039b6aa1719cf8195adfe0f05cfa4dde1d8f6cd66e7757fbf3757a3c61b35d743e3d39d0672e869dc72d625b8c9b73b8905c1043eaf7f396d5757bb97

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks