General

  • Target

    3f734ec747db7e5c3af5d25d40324b14f9da76da1e7f183b310027d143ef25fd

  • Size

    4.0MB

  • Sample

    220830-b34j9shhgq

  • MD5

    c81a73dcc27459903b5ff3a48b6d0c5a

  • SHA1

    a45c9c2023ddbd9f78e2238e55838978980bd998

  • SHA256

    3f734ec747db7e5c3af5d25d40324b14f9da76da1e7f183b310027d143ef25fd

  • SHA512

    19135280538e3670314dd447141e2c1bec57fe283fb5fa560b8567b49720eded793e7b622cc6f233fc70a70aeabb5689e451ca0f054cb5e6d14d86fbf7ba2d6e

  • SSDEEP

    98304:DJJYBywiF4PobmLprqcqEr4JnvxEnByep:nY64WmLynunB

Malware Config

Targets

    • Target

      3f734ec747db7e5c3af5d25d40324b14f9da76da1e7f183b310027d143ef25fd

    • Size

      4.0MB

    • MD5

      c81a73dcc27459903b5ff3a48b6d0c5a

    • SHA1

      a45c9c2023ddbd9f78e2238e55838978980bd998

    • SHA256

      3f734ec747db7e5c3af5d25d40324b14f9da76da1e7f183b310027d143ef25fd

    • SHA512

      19135280538e3670314dd447141e2c1bec57fe283fb5fa560b8567b49720eded793e7b622cc6f233fc70a70aeabb5689e451ca0f054cb5e6d14d86fbf7ba2d6e

    • SSDEEP

      98304:DJJYBywiF4PobmLprqcqEr4JnvxEnByep:nY64WmLynunB

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks