General

  • Target

    4a0800698528e4d9808db95df7e28fe5a9a8e042427ddd59a95947a086693dcd

  • Size

    4.0MB

  • Sample

    220830-b5ry9aaaam

  • MD5

    ceb960702991dd014f338793ac08615a

  • SHA1

    cfcf9af9fd3015279d29b2e8f8e2dd0c0884fb5a

  • SHA256

    4a0800698528e4d9808db95df7e28fe5a9a8e042427ddd59a95947a086693dcd

  • SHA512

    5ff6e6a82d03a64a342c1d29af5eef137b9ebd515f0c01613bf9eddf2dd5da9ba4af2cbfb3154b56c9351372c6e9716adc3b9ea0692b1dd8050fef4b74c6de4d

  • SSDEEP

    98304:UgSFMDZvZLVH5b3FON1vbXSwm2vE7gjk14CczPUTEMIOoUG4erhgvdr+3qX7:ZUMlZLDrcN1vbCwvvYggytPDtOoUG4XL

Malware Config

Targets

    • Target

      4a0800698528e4d9808db95df7e28fe5a9a8e042427ddd59a95947a086693dcd

    • Size

      4.0MB

    • MD5

      ceb960702991dd014f338793ac08615a

    • SHA1

      cfcf9af9fd3015279d29b2e8f8e2dd0c0884fb5a

    • SHA256

      4a0800698528e4d9808db95df7e28fe5a9a8e042427ddd59a95947a086693dcd

    • SHA512

      5ff6e6a82d03a64a342c1d29af5eef137b9ebd515f0c01613bf9eddf2dd5da9ba4af2cbfb3154b56c9351372c6e9716adc3b9ea0692b1dd8050fef4b74c6de4d

    • SSDEEP

      98304:UgSFMDZvZLVH5b3FON1vbXSwm2vE7gjk14CczPUTEMIOoUG4erhgvdr+3qX7:ZUMlZLDrcN1vbCwvvYggytPDtOoUG4XL

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks