General

  • Target

    516dd8e04c8d026235107a5c7f5756e03dd5d0b191713fce64932751bd6f8628

  • Size

    4.0MB

  • Sample

    220830-b7nplsaaek

  • MD5

    9c623a7f390a621d699ddd5dcd3ebd3a

  • SHA1

    cb7bf42adfa9217fdcc316ca3b0042b1e05a4dd6

  • SHA256

    516dd8e04c8d026235107a5c7f5756e03dd5d0b191713fce64932751bd6f8628

  • SHA512

    fbe565962d0fc30cc3215df20099fdc9ecc66f82a86801e4cdccaf3d46e5a00b33f2a022f34dd0ad752ac1ba36a754a6833c6bd129e2d0eb52156173e4165fc2

  • SSDEEP

    98304:tvyi4bvXg4gvXWgOU6OQBA/0yq+2E2iLi19ebwZNLMVzZA:wiTBu3S/0E26iLawZKBZ

Malware Config

Targets

    • Target

      516dd8e04c8d026235107a5c7f5756e03dd5d0b191713fce64932751bd6f8628

    • Size

      4.0MB

    • MD5

      9c623a7f390a621d699ddd5dcd3ebd3a

    • SHA1

      cb7bf42adfa9217fdcc316ca3b0042b1e05a4dd6

    • SHA256

      516dd8e04c8d026235107a5c7f5756e03dd5d0b191713fce64932751bd6f8628

    • SHA512

      fbe565962d0fc30cc3215df20099fdc9ecc66f82a86801e4cdccaf3d46e5a00b33f2a022f34dd0ad752ac1ba36a754a6833c6bd129e2d0eb52156173e4165fc2

    • SSDEEP

      98304:tvyi4bvXg4gvXWgOU6OQBA/0yq+2E2iLi19ebwZNLMVzZA:wiTBu3S/0E26iLawZKBZ

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks