General

  • Target

    77ADAF5DEA0FACF1E0D4F04FDADB88821345F33F9247BAE401F2CA1787E5F646

  • Size

    4.0MB

  • Sample

    220812-hwnzkaaahl

  • MD5

    68328241710d5f8912e08ca834c2bd63

  • SHA1

    8e6d159aed1cf0041cae561d16f581d0b2b6d4ac

  • SHA256

    77adaf5dea0facf1e0d4f04fdadb88821345f33f9247bae401f2ca1787e5f646

  • SHA512

    6dcbca3dab4caad434d052dadbf760c8c173ffbf99e5b4e3e9b44a99072a30ea77a73a97109d4e965e6f4be620251dec9aee11137f632c508220c2293f836a57

Malware Config

Targets

    • Target

      77ADAF5DEA0FACF1E0D4F04FDADB88821345F33F9247BAE401F2CA1787E5F646

    • Size

      4.0MB

    • MD5

      68328241710d5f8912e08ca834c2bd63

    • SHA1

      8e6d159aed1cf0041cae561d16f581d0b2b6d4ac

    • SHA256

      77adaf5dea0facf1e0d4f04fdadb88821345f33f9247bae401f2ca1787e5f646

    • SHA512

      6dcbca3dab4caad434d052dadbf760c8c173ffbf99e5b4e3e9b44a99072a30ea77a73a97109d4e965e6f4be620251dec9aee11137f632c508220c2293f836a57

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks