General

  • Target

    5bea09608f815c54c80389a46f87b8de4731dba9808e0833f7cc112c89e84b65

  • Size

    4.0MB

  • Sample

    220830-b84r8aaagl

  • MD5

    dc52531c394cfa7c1e09f2e05cc57d03

  • SHA1

    104be0615af4e7aaed5ee653ed63ce7ba87e5eae

  • SHA256

    5bea09608f815c54c80389a46f87b8de4731dba9808e0833f7cc112c89e84b65

  • SHA512

    4b8906210f1b2c8c878614bda2a02de9d3ce5e680d5f26d99c3aa869c6ed2060c61770ee6c7dfec0ce472267b83ad3028c1d5afb78ce48d1f2bc988d588ee7af

  • SSDEEP

    98304:UHW5fshQzuTwM0shXcByNK/mXJnWly3YRsDO7TWL1iI5TfVJJi:UhZwDzQM/mXZW3kOfWLQIR9JJi

Malware Config

Targets

    • Target

      5bea09608f815c54c80389a46f87b8de4731dba9808e0833f7cc112c89e84b65

    • Size

      4.0MB

    • MD5

      dc52531c394cfa7c1e09f2e05cc57d03

    • SHA1

      104be0615af4e7aaed5ee653ed63ce7ba87e5eae

    • SHA256

      5bea09608f815c54c80389a46f87b8de4731dba9808e0833f7cc112c89e84b65

    • SHA512

      4b8906210f1b2c8c878614bda2a02de9d3ce5e680d5f26d99c3aa869c6ed2060c61770ee6c7dfec0ce472267b83ad3028c1d5afb78ce48d1f2bc988d588ee7af

    • SSDEEP

      98304:UHW5fshQzuTwM0shXcByNK/mXJnWly3YRsDO7TWL1iI5TfVJJi:UhZwDzQM/mXZW3kOfWLQIR9JJi

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks