General

  • Target

    357ae268fb3ca9079a3cc844dbb07088d6c4eb8ef18de7c5e974d8bead1cb996

  • Size

    4.0MB

  • Sample

    220830-b1tx2sahg9

  • MD5

    e3bd38237b5a50a15c2163135aeb4311

  • SHA1

    6e206e1a3dda12e7c10806b06f38e13ed2a10aa3

  • SHA256

    357ae268fb3ca9079a3cc844dbb07088d6c4eb8ef18de7c5e974d8bead1cb996

  • SHA512

    549bd4aa1ec91a9e8f808c47c33c94a8539bb3e1274d1fd6b19534d6fe31a685af86b5273d17792e492cc8c8fa4c740bd1afb15558dda781c4e0d1323e8fbb79

  • SSDEEP

    98304:Ngt1GfVHUbmuQacY/Ex6hZqxY6X/gQZ5DEmU:mt0N0bm4cu466nX/2m

Malware Config

Targets

    • Target

      357ae268fb3ca9079a3cc844dbb07088d6c4eb8ef18de7c5e974d8bead1cb996

    • Size

      4.0MB

    • MD5

      e3bd38237b5a50a15c2163135aeb4311

    • SHA1

      6e206e1a3dda12e7c10806b06f38e13ed2a10aa3

    • SHA256

      357ae268fb3ca9079a3cc844dbb07088d6c4eb8ef18de7c5e974d8bead1cb996

    • SHA512

      549bd4aa1ec91a9e8f808c47c33c94a8539bb3e1274d1fd6b19534d6fe31a685af86b5273d17792e492cc8c8fa4c740bd1afb15558dda781c4e0d1323e8fbb79

    • SSDEEP

      98304:Ngt1GfVHUbmuQacY/Ex6hZqxY6X/gQZ5DEmU:mt0N0bm4cu466nX/2m

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks