General

  • Target

    37c78bff561491a320de992ff41277fd830e100c5ae3e7e83427f854b13c6355

  • Size

    4.0MB

  • Sample

    220830-b2cp6ahhej

  • MD5

    2701033d21e002170ba74701bc43e318

  • SHA1

    61b2e6a1e5cbe0ef2f7e29234af2e703e0698aeb

  • SHA256

    37c78bff561491a320de992ff41277fd830e100c5ae3e7e83427f854b13c6355

  • SHA512

    fcf656986080282380a4fa6b8f5931bbb594b7ad18574d2a96224f5fd94318bd7cf5a07b4acfadbd8c2400a4b817b47a390f90f2eb905d946f486b426eb1fcb4

  • SSDEEP

    98304:qzFhhI+mgePySZ2oVAtIoz7T9St0d51nOwX13NMTV3kNiy1m:qZhhZ1eq4Atwt0dGwX138VkNiu

Malware Config

Targets

    • Target

      37c78bff561491a320de992ff41277fd830e100c5ae3e7e83427f854b13c6355

    • Size

      4.0MB

    • MD5

      2701033d21e002170ba74701bc43e318

    • SHA1

      61b2e6a1e5cbe0ef2f7e29234af2e703e0698aeb

    • SHA256

      37c78bff561491a320de992ff41277fd830e100c5ae3e7e83427f854b13c6355

    • SHA512

      fcf656986080282380a4fa6b8f5931bbb594b7ad18574d2a96224f5fd94318bd7cf5a07b4acfadbd8c2400a4b817b47a390f90f2eb905d946f486b426eb1fcb4

    • SSDEEP

      98304:qzFhhI+mgePySZ2oVAtIoz7T9St0d51nOwX13NMTV3kNiy1m:qZhhZ1eq4Atwt0dGwX138VkNiu

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks