General

  • Target

    54ab7ebc82f14ad65fc83533d98709fb209ece783b63c53d8f95518936424b4c

  • Size

    4.0MB

  • Sample

    220830-b742laaaem

  • MD5

    a7aa0bd3162bcef17b768bc35f460090

  • SHA1

    287f75be4f9cdac70efe7130023a68475de4091b

  • SHA256

    54ab7ebc82f14ad65fc83533d98709fb209ece783b63c53d8f95518936424b4c

  • SHA512

    ac73fc39dffea633639b07647cc9e62ecd85644f5eb3d981283b1d1334b7c7b4c9789b58de7c1a0705a2eb076ec733b99f03d3aa30769ad473f926de56381f1f

  • SSDEEP

    98304:iQFrmQGZtNpE8+QarKW9WaMUOsC0vlRoStFtNjo3x24toZfDIBxyF:jFaQGZ/pRMKtF3sPni3x/iZ6w

Malware Config

Targets

    • Target

      54ab7ebc82f14ad65fc83533d98709fb209ece783b63c53d8f95518936424b4c

    • Size

      4.0MB

    • MD5

      a7aa0bd3162bcef17b768bc35f460090

    • SHA1

      287f75be4f9cdac70efe7130023a68475de4091b

    • SHA256

      54ab7ebc82f14ad65fc83533d98709fb209ece783b63c53d8f95518936424b4c

    • SHA512

      ac73fc39dffea633639b07647cc9e62ecd85644f5eb3d981283b1d1334b7c7b4c9789b58de7c1a0705a2eb076ec733b99f03d3aa30769ad473f926de56381f1f

    • SSDEEP

      98304:iQFrmQGZtNpE8+QarKW9WaMUOsC0vlRoStFtNjo3x24toZfDIBxyF:jFaQGZ/pRMKtF3sPni3x/iZ6w

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks