General

  • Target

    0438d22074dc8c6ffc1023c48bd20aa8126d085316fb3afc88b224bfe3d36e08

  • Size

    4.0MB

  • Sample

    220830-blawmahehq

  • MD5

    1f54f1959ef39c6acf3202267af48774

  • SHA1

    a5ca27774d1b63a2d72ae2bd76d314e6006f847a

  • SHA256

    0438d22074dc8c6ffc1023c48bd20aa8126d085316fb3afc88b224bfe3d36e08

  • SHA512

    641f5d6dd6ce61e447ba2d663cc7ee763c25312b8842f5c76a8de01db4662cb218cf8134082fb0278aedf7b52494ee4eed19a372ce8c34ff38971db4bc19b4c7

  • SSDEEP

    98304:2cg4QHyhQRdIu1NvqrryuG8B2ST0ZTvvv/PFg8U/7:2cnQHyhLu/vqrOQT0ZDv/PFvI7

Malware Config

Targets

    • Target

      0438d22074dc8c6ffc1023c48bd20aa8126d085316fb3afc88b224bfe3d36e08

    • Size

      4.0MB

    • MD5

      1f54f1959ef39c6acf3202267af48774

    • SHA1

      a5ca27774d1b63a2d72ae2bd76d314e6006f847a

    • SHA256

      0438d22074dc8c6ffc1023c48bd20aa8126d085316fb3afc88b224bfe3d36e08

    • SHA512

      641f5d6dd6ce61e447ba2d663cc7ee763c25312b8842f5c76a8de01db4662cb218cf8134082fb0278aedf7b52494ee4eed19a372ce8c34ff38971db4bc19b4c7

    • SSDEEP

      98304:2cg4QHyhQRdIu1NvqrryuG8B2ST0ZTvvv/PFg8U/7:2cnQHyhLu/vqrOQT0ZDv/PFvI7

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks