General

  • Target

    5b08e063218b4594107fc3df89fdd21856df8c30578968f0918d8e1b0e059a52

  • Size

    4.0MB

  • Sample

    220830-b8xznsaagk

  • MD5

    4bfc574d33adc8f1338efc458332abf3

  • SHA1

    b19fea82232343239776997398871648673cfd6a

  • SHA256

    5b08e063218b4594107fc3df89fdd21856df8c30578968f0918d8e1b0e059a52

  • SHA512

    5dfcbc60b7e104236cf4f6d2734452ad78361bac9c0ebcb0af37d157b1b8b72f1b54448b7cf743be452c4074f85ab126cd8b3b1d424f81b6024f35d0877a8034

  • SSDEEP

    98304:YQgmjyQJ3l9xYCEn3M/PYVd7CLQgDjPQqV/5ya:1EQFl9xtEAulGRDjoqJ5

Malware Config

Targets

    • Target

      5b08e063218b4594107fc3df89fdd21856df8c30578968f0918d8e1b0e059a52

    • Size

      4.0MB

    • MD5

      4bfc574d33adc8f1338efc458332abf3

    • SHA1

      b19fea82232343239776997398871648673cfd6a

    • SHA256

      5b08e063218b4594107fc3df89fdd21856df8c30578968f0918d8e1b0e059a52

    • SHA512

      5dfcbc60b7e104236cf4f6d2734452ad78361bac9c0ebcb0af37d157b1b8b72f1b54448b7cf743be452c4074f85ab126cd8b3b1d424f81b6024f35d0877a8034

    • SSDEEP

      98304:YQgmjyQJ3l9xYCEn3M/PYVd7CLQgDjPQqV/5ya:1EQFl9xtEAulGRDjoqJ5

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks