General

  • Target

    51a7a812de5da10e17419c51af06c5dc9b24e4ce4bc7625ebdc8972c5f81df6b

  • Size

    4.0MB

  • Sample

    220830-b7snkaaael

  • MD5

    67d33bde0b55c5894611f6afa3d4f858

  • SHA1

    28161d3b9beefb983b20cae8617b33796e2b984e

  • SHA256

    51a7a812de5da10e17419c51af06c5dc9b24e4ce4bc7625ebdc8972c5f81df6b

  • SHA512

    16f025ae442137f007dc30b1ae4d75cac2f26dea2d2bfbb96113ced1cbde079104dec11d99bc208ad9a8943f5b1dc28a30aae6899b07a7233d023f6c3b5c4996

  • SSDEEP

    98304:3Rr8OpkVJOgtpnCUIMK1DOJlwTTGuKqfZ+H4FQFDdrJ9FX:hofVJOgtRJIMGD+uN24QFDd

Malware Config

Targets

    • Target

      51a7a812de5da10e17419c51af06c5dc9b24e4ce4bc7625ebdc8972c5f81df6b

    • Size

      4.0MB

    • MD5

      67d33bde0b55c5894611f6afa3d4f858

    • SHA1

      28161d3b9beefb983b20cae8617b33796e2b984e

    • SHA256

      51a7a812de5da10e17419c51af06c5dc9b24e4ce4bc7625ebdc8972c5f81df6b

    • SHA512

      16f025ae442137f007dc30b1ae4d75cac2f26dea2d2bfbb96113ced1cbde079104dec11d99bc208ad9a8943f5b1dc28a30aae6899b07a7233d023f6c3b5c4996

    • SSDEEP

      98304:3Rr8OpkVJOgtpnCUIMK1DOJlwTTGuKqfZ+H4FQFDdrJ9FX:hofVJOgtRJIMGD+uN24QFDd

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks