General

  • Target

    8FAD375A8A496CE65F85DFD94EF6410123C9FA22A3C0B35D9395B8BD79C29033

  • Size

    4.0MB

  • Sample

    220812-hxp81scfe3

  • MD5

    6fe551628b87a45b85dd17d99078b0f2

  • SHA1

    4b4deab383667dabfd2238ca0e7ceacfec7c881f

  • SHA256

    8fad375a8a496ce65f85dfd94ef6410123c9fa22a3c0b35d9395b8bd79c29033

  • SHA512

    d8f13d1f9f93f10b9709c33e50e997c908b9c007c9e6b91c5d26dd22717321f3f17683f80407a1512ab91f4ac186fb27ded635c284226b038c50a06d551c9aeb

Malware Config

Targets

    • Target

      8FAD375A8A496CE65F85DFD94EF6410123C9FA22A3C0B35D9395B8BD79C29033

    • Size

      4.0MB

    • MD5

      6fe551628b87a45b85dd17d99078b0f2

    • SHA1

      4b4deab383667dabfd2238ca0e7ceacfec7c881f

    • SHA256

      8fad375a8a496ce65f85dfd94ef6410123c9fa22a3c0b35d9395b8bd79c29033

    • SHA512

      d8f13d1f9f93f10b9709c33e50e997c908b9c007c9e6b91c5d26dd22717321f3f17683f80407a1512ab91f4ac186fb27ded635c284226b038c50a06d551c9aeb

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks