General

  • Target

    36d171abfe43ca2ba225a24ea21b13c3b61aaba2bfb66c4195e606357b35e84d

  • Size

    4.0MB

  • Sample

    220830-b19nhaahh2

  • MD5

    a4d29c981b233653ca656d0c042c4901

  • SHA1

    50a2f3d8c1bba3448fd82e9d607906184576fdc1

  • SHA256

    36d171abfe43ca2ba225a24ea21b13c3b61aaba2bfb66c4195e606357b35e84d

  • SHA512

    74d261646c1c1969ff5563013517b8632e038dbe72ba6b1477fad85e144c88bea960942d01bbef4c57529b68d0f7c15f5116ff8aa429717de05cb796927f9dd4

  • SSDEEP

    98304:+wqYz2qijwc9TQDcgVwMShtjEV0Yn0xhz5:VcqijZ9TQDcgV2htjEeYn0xt5

Malware Config

Targets

    • Target

      36d171abfe43ca2ba225a24ea21b13c3b61aaba2bfb66c4195e606357b35e84d

    • Size

      4.0MB

    • MD5

      a4d29c981b233653ca656d0c042c4901

    • SHA1

      50a2f3d8c1bba3448fd82e9d607906184576fdc1

    • SHA256

      36d171abfe43ca2ba225a24ea21b13c3b61aaba2bfb66c4195e606357b35e84d

    • SHA512

      74d261646c1c1969ff5563013517b8632e038dbe72ba6b1477fad85e144c88bea960942d01bbef4c57529b68d0f7c15f5116ff8aa429717de05cb796927f9dd4

    • SSDEEP

      98304:+wqYz2qijwc9TQDcgVwMShtjEV0Yn0xhz5:VcqijZ9TQDcgV2htjEeYn0xt5

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks