General

  • Target

    3c4ae55e479c695d5aa5dc9ee43d94828d15c5704fafa94fb8123ef7a25485c8

  • Size

    4.0MB

  • Sample

    220830-b21rzshhfm

  • MD5

    153512c6b4ff21d7292831b08dbf6bab

  • SHA1

    724501816dd397a985cca95edd912d73122e6887

  • SHA256

    3c4ae55e479c695d5aa5dc9ee43d94828d15c5704fafa94fb8123ef7a25485c8

  • SHA512

    8d246a8e66ba6ea1dc900e48a9247f4f6baa23f52821c54d926552ea0c47e566e518798d51d5260e2078ef55650d83761e4b3c74d105f9cfeed4d16b495d6a0c

  • SSDEEP

    98304:vEUWrIfLfc71k1IbBZVnQrDK+zRvL/YvhQgpR2P6IMsS:vEUWrafciybBZVm1NL/yLs6Ia

Malware Config

Targets

    • Target

      3c4ae55e479c695d5aa5dc9ee43d94828d15c5704fafa94fb8123ef7a25485c8

    • Size

      4.0MB

    • MD5

      153512c6b4ff21d7292831b08dbf6bab

    • SHA1

      724501816dd397a985cca95edd912d73122e6887

    • SHA256

      3c4ae55e479c695d5aa5dc9ee43d94828d15c5704fafa94fb8123ef7a25485c8

    • SHA512

      8d246a8e66ba6ea1dc900e48a9247f4f6baa23f52821c54d926552ea0c47e566e518798d51d5260e2078ef55650d83761e4b3c74d105f9cfeed4d16b495d6a0c

    • SSDEEP

      98304:vEUWrIfLfc71k1IbBZVnQrDK+zRvL/YvhQgpR2P6IMsS:vEUWrafciybBZVm1NL/yLs6Ia

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks