General

  • Target

    5d2e7effc457c9e19183b1329323c5f67fe8c87b7e87cdbdbfc677d5242ccea8

  • Size

    4.0MB

  • Sample

    220830-b9jhnsbbb5

  • MD5

    47b57b84514ccb32cc74ea7211cc8a0e

  • SHA1

    d4445c2dbd463735755926ef557eb0801ddf529f

  • SHA256

    5d2e7effc457c9e19183b1329323c5f67fe8c87b7e87cdbdbfc677d5242ccea8

  • SHA512

    cac5404ae11a5e77197f86b967bf03cda79b5b693b145e0fb7b9a85005eababe01decadbf67bb18b32bbe0d6db00e9bdedf7284d8e6dcc8066c1c38a7ccd7f85

  • SSDEEP

    98304:04rsF/ocO1v0jrisWCw29BNFUa30aoqv5p+Xe55wEz:Vy/oH0OjC19d50Ip+Xq5

Malware Config

Targets

    • Target

      5d2e7effc457c9e19183b1329323c5f67fe8c87b7e87cdbdbfc677d5242ccea8

    • Size

      4.0MB

    • MD5

      47b57b84514ccb32cc74ea7211cc8a0e

    • SHA1

      d4445c2dbd463735755926ef557eb0801ddf529f

    • SHA256

      5d2e7effc457c9e19183b1329323c5f67fe8c87b7e87cdbdbfc677d5242ccea8

    • SHA512

      cac5404ae11a5e77197f86b967bf03cda79b5b693b145e0fb7b9a85005eababe01decadbf67bb18b32bbe0d6db00e9bdedf7284d8e6dcc8066c1c38a7ccd7f85

    • SSDEEP

      98304:04rsF/ocO1v0jrisWCw29BNFUa30aoqv5p+Xe55wEz:Vy/oH0OjC19d50Ip+Xq5

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks