General

  • Target

    5778d7de6f29679fc478927d4f64217a035dada1572410a212dd61cde5c2e63a

  • Size

    4.0MB

  • Sample

    220830-b79xvaaafm

  • MD5

    1d18d6fc485bc20494b043325fd9c43d

  • SHA1

    6b2d6ac51efc56eb3be60960a5527dddea5b380b

  • SHA256

    5778d7de6f29679fc478927d4f64217a035dada1572410a212dd61cde5c2e63a

  • SHA512

    85b40fbf56a176e23b6a18768c11aab1d1fc6d931df4a32ac976206e63f2895b491a6e4df4b33736621b8436c22559d99a8bca53071906a6900470ed32adf7a8

  • SSDEEP

    98304:XXQq3YIckZibVybMEmFi4R836IZVvJflks9ECtXhN5gugim0Ul:jzAWER83BZjflGSdgSU

Malware Config

Targets

    • Target

      5778d7de6f29679fc478927d4f64217a035dada1572410a212dd61cde5c2e63a

    • Size

      4.0MB

    • MD5

      1d18d6fc485bc20494b043325fd9c43d

    • SHA1

      6b2d6ac51efc56eb3be60960a5527dddea5b380b

    • SHA256

      5778d7de6f29679fc478927d4f64217a035dada1572410a212dd61cde5c2e63a

    • SHA512

      85b40fbf56a176e23b6a18768c11aab1d1fc6d931df4a32ac976206e63f2895b491a6e4df4b33736621b8436c22559d99a8bca53071906a6900470ed32adf7a8

    • SSDEEP

      98304:XXQq3YIckZibVybMEmFi4R836IZVvJflks9ECtXhN5gugim0Ul:jzAWER83BZjflGSdgSU

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks