General

  • Target

    4e9373930b2405ae8637b6471bfbb30f29721512ef3e2c6338192e6e20b137de

  • Size

    4.0MB

  • Sample

    220830-b633xaaadk

  • MD5

    e19f0ace48615ef8fb7bc27b3677f1e4

  • SHA1

    a106fa03e9076c7ef5c555edafb2db55b987ec1d

  • SHA256

    4e9373930b2405ae8637b6471bfbb30f29721512ef3e2c6338192e6e20b137de

  • SHA512

    28d4027a78ebf76abc8773c28b277ff24e3dfa32a496260d906ee676abe5c29e62f1ec0b81c09efd47cf28a51c130775357066d62d1ea3fcee41e2a0845aa2fb

  • SSDEEP

    98304:76ZjstIPMoauNDjc/SXuDyzw0WenFTfDWoIi7Patk8Ml7LFx:7mQeXAetzw0hndbNIMEdMdFx

Malware Config

Targets

    • Target

      4e9373930b2405ae8637b6471bfbb30f29721512ef3e2c6338192e6e20b137de

    • Size

      4.0MB

    • MD5

      e19f0ace48615ef8fb7bc27b3677f1e4

    • SHA1

      a106fa03e9076c7ef5c555edafb2db55b987ec1d

    • SHA256

      4e9373930b2405ae8637b6471bfbb30f29721512ef3e2c6338192e6e20b137de

    • SHA512

      28d4027a78ebf76abc8773c28b277ff24e3dfa32a496260d906ee676abe5c29e62f1ec0b81c09efd47cf28a51c130775357066d62d1ea3fcee41e2a0845aa2fb

    • SSDEEP

      98304:76ZjstIPMoauNDjc/SXuDyzw0WenFTfDWoIi7Patk8Ml7LFx:7mQeXAetzw0hndbNIMEdMdFx

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks