General

  • Target

    02baf2e8b609c10f2778ace88e012b329a98f792d054bb55f9d2290a000425c0

  • Size

    4.0MB

  • Sample

    220830-bkv56shehp

  • MD5

    699ff52c89b6aa4a20f6bed82460f1d6

  • SHA1

    63dc4da1f06cbec8fb343cb968af3caf2c6a5453

  • SHA256

    02baf2e8b609c10f2778ace88e012b329a98f792d054bb55f9d2290a000425c0

  • SHA512

    d7d6b74500a0c70756a700a7f683f80e82b94d528351ebef3a08fbd1ec55cd975719b79f49f539be33c4e552b90d37a2bcb152560995626460d7a4f75291c211

  • SSDEEP

    98304:y6rF69l0bczBcfQ0bHnXwswzVr70xtEiCarsbb8gqPjzC2B3q:y6696wcoIApVrAAiUUjzC

Malware Config

Targets

    • Target

      02baf2e8b609c10f2778ace88e012b329a98f792d054bb55f9d2290a000425c0

    • Size

      4.0MB

    • MD5

      699ff52c89b6aa4a20f6bed82460f1d6

    • SHA1

      63dc4da1f06cbec8fb343cb968af3caf2c6a5453

    • SHA256

      02baf2e8b609c10f2778ace88e012b329a98f792d054bb55f9d2290a000425c0

    • SHA512

      d7d6b74500a0c70756a700a7f683f80e82b94d528351ebef3a08fbd1ec55cd975719b79f49f539be33c4e552b90d37a2bcb152560995626460d7a4f75291c211

    • SSDEEP

      98304:y6rF69l0bczBcfQ0bHnXwswzVr70xtEiCarsbb8gqPjzC2B3q:y6696wcoIApVrAAiUUjzC

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks