General

  • Target

    50f6ed33ecbfe835cd69ad989fca695b815b187d967366ed9db8533d834e9e82

  • Size

    4.0MB

  • Sample

    220830-b7erpsaaej

  • MD5

    cd5c221c4973b7f1c136184689618f7f

  • SHA1

    722e60ffc5bacccd3fc8232e2d5620a57aba541a

  • SHA256

    50f6ed33ecbfe835cd69ad989fca695b815b187d967366ed9db8533d834e9e82

  • SHA512

    973a14e40c9e4c82bedde1900edf2f420a6cc90f5531f1f2f538fa44350fe6b33bda87b0835945cb790f2f46966d9b4fe2db84ecb2574e418352c2d6d44aa73e

  • SSDEEP

    98304:r/1N2AZDM1ocWSOM4eT1MYqtV0QIBB5EQyONrSyK945uN5ubidqqQQr/D:rdEQDMUZiTGY4bIBB5XyONrVRuNSid9r

Malware Config

Targets

    • Target

      50f6ed33ecbfe835cd69ad989fca695b815b187d967366ed9db8533d834e9e82

    • Size

      4.0MB

    • MD5

      cd5c221c4973b7f1c136184689618f7f

    • SHA1

      722e60ffc5bacccd3fc8232e2d5620a57aba541a

    • SHA256

      50f6ed33ecbfe835cd69ad989fca695b815b187d967366ed9db8533d834e9e82

    • SHA512

      973a14e40c9e4c82bedde1900edf2f420a6cc90f5531f1f2f538fa44350fe6b33bda87b0835945cb790f2f46966d9b4fe2db84ecb2574e418352c2d6d44aa73e

    • SSDEEP

      98304:r/1N2AZDM1ocWSOM4eT1MYqtV0QIBB5EQyONrSyK945uN5ubidqqQQr/D:rdEQDMUZiTGY4bIBB5XyONrVRuNSid9r

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks