General

  • Target

    3290b6fc407ca4828e73fe5914940de430cce9b3450398f995f276dd4d79b36c

  • Size

    4.0MB

  • Sample

    220830-b1d7lahhdl

  • MD5

    e61da6b188205be24d051274eefde385

  • SHA1

    7290650457a9018eb407e2f0383ee71aee0e36b5

  • SHA256

    3290b6fc407ca4828e73fe5914940de430cce9b3450398f995f276dd4d79b36c

  • SHA512

    da732c366bb7362abd3d19732ae66eb5179b571be097dcd870d8688d8a834a4544f1d718c144d6d5b85f9e8dda7f47a618117acbabe50057557064fd2a85c73d

  • SSDEEP

    98304:edfu1ddsI9d4Y6Kd0SvFJGEwYY1lCjNgI3o+8qkqwFaJx:EfhIb4Yf3p/m0jNgI3iqagx

Malware Config

Targets

    • Target

      3290b6fc407ca4828e73fe5914940de430cce9b3450398f995f276dd4d79b36c

    • Size

      4.0MB

    • MD5

      e61da6b188205be24d051274eefde385

    • SHA1

      7290650457a9018eb407e2f0383ee71aee0e36b5

    • SHA256

      3290b6fc407ca4828e73fe5914940de430cce9b3450398f995f276dd4d79b36c

    • SHA512

      da732c366bb7362abd3d19732ae66eb5179b571be097dcd870d8688d8a834a4544f1d718c144d6d5b85f9e8dda7f47a618117acbabe50057557064fd2a85c73d

    • SSDEEP

      98304:edfu1ddsI9d4Y6Kd0SvFJGEwYY1lCjNgI3o+8qkqwFaJx:EfhIb4Yf3p/m0jNgI3iqagx

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks