General

  • Target

    c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8.zip

  • Size

    4.0MB

  • Sample

    220825-zy7ywsbadn

  • MD5

    2c266fc002c1f072d47462d0e23c5d2c

  • SHA1

    252cda51c8744d1395800b89cf00449c73a0fd30

  • SHA256

    8edeb501cb81a79e444ab29f7be396990deca5838fb8120565113b6aa75a5bfe

  • SHA512

    0752590575db177dabeeecaf602f1e2de476b579b3d6ddcca5c2207d725bb03880ac1925532bf6539375616bd79df589cfb9848f73bd3b1f855654ed2bdc7971

  • SSDEEP

    98304:1fr/0xZLwgpACYmhQIAxxSWKT0s/gI+cTLrh1WSzyF1g:1frsZLcmhQIAMt/gxcPtgSW1g

Malware Config

Targets

    • Target

      c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8

    • Size

      4.0MB

    • MD5

      27167814efa448fec2bbcf35991f5eca

    • SHA1

      85a1aae8faa4fbd0985fa357586b3c5bc4f4e3ab

    • SHA256

      c3681da8cdbba19041d36bb0fbec162ddaae98a2ba9fe2b29d252e26f64a4ec8

    • SHA512

      3832c84b76db5404fb67b5d2c90c59a012dff4631bf9fa276879d11f65ecd14ed0b1b00af6d01eb3854279a874aca5e2d763ff6d316505e67276adc92232a85b

    • SSDEEP

      98304:z5B42wq73hy6pTzQDl5sY8SCekSFxfNfe2K/FpK:z5PR73hy6S7kIkSFx5e2KG

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks