General

  • Target

    02fbc16f240023c0ad872ec1c28ca213d5fdc8bf1d8731e2fbee5f88da56bfa6

  • Size

    4.0MB

  • Sample

    220830-bk4sbaafe7

  • MD5

    8b5dfbceeb3cc80ced3a6e43e6e45307

  • SHA1

    cd10c62afd118ee6dbdea28df5676b18ed0b9af6

  • SHA256

    02fbc16f240023c0ad872ec1c28ca213d5fdc8bf1d8731e2fbee5f88da56bfa6

  • SHA512

    5c0df3e960dc75d204aef02ea006c4135d50fe9654a0d55c3c66c19047e89856323f109df9749a5b7b56ef78b7200c0882a85561513c1526322edad7436a5d3b

  • SSDEEP

    98304:IzCs6IZ2k7AMUrtN3zFayq2VO6DbfK1okdAdrnypNpC:IWcYcpEtN3pa32VBDm1oLc

Malware Config

Targets

    • Target

      02fbc16f240023c0ad872ec1c28ca213d5fdc8bf1d8731e2fbee5f88da56bfa6

    • Size

      4.0MB

    • MD5

      8b5dfbceeb3cc80ced3a6e43e6e45307

    • SHA1

      cd10c62afd118ee6dbdea28df5676b18ed0b9af6

    • SHA256

      02fbc16f240023c0ad872ec1c28ca213d5fdc8bf1d8731e2fbee5f88da56bfa6

    • SHA512

      5c0df3e960dc75d204aef02ea006c4135d50fe9654a0d55c3c66c19047e89856323f109df9749a5b7b56ef78b7200c0882a85561513c1526322edad7436a5d3b

    • SSDEEP

      98304:IzCs6IZ2k7AMUrtN3zFayq2VO6DbfK1okdAdrnypNpC:IWcYcpEtN3pa32VBDm1oLc

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks