General

  • Target

    0479dcecf6519649f1a7e79f19cd02a7c13bb0650272ba8c39bc377edeeec47c

  • Size

    4.0MB

  • Sample

    220830-blgdeaafe8

  • MD5

    51c64ff952923607e18d7535f6f3451e

  • SHA1

    893f5d9d4094b13bd5847f5fa937b51fe4d0e79d

  • SHA256

    0479dcecf6519649f1a7e79f19cd02a7c13bb0650272ba8c39bc377edeeec47c

  • SHA512

    f8cb254e2544c4265d059960743460fd0b33f622324c7932ccf29dcf8eececb70270ddb003db1adad3175604c21495b6005931a4b8360c4e25d6a9d7d9b7e991

  • SSDEEP

    98304:fOmOrMFkEGXtR35mO/KNkhJhQO1jCQ6WmOuzSQxKYEBZoEl5jcys:HMR35mOCyd1aWmSYALne

Malware Config

Targets

    • Target

      0479dcecf6519649f1a7e79f19cd02a7c13bb0650272ba8c39bc377edeeec47c

    • Size

      4.0MB

    • MD5

      51c64ff952923607e18d7535f6f3451e

    • SHA1

      893f5d9d4094b13bd5847f5fa937b51fe4d0e79d

    • SHA256

      0479dcecf6519649f1a7e79f19cd02a7c13bb0650272ba8c39bc377edeeec47c

    • SHA512

      f8cb254e2544c4265d059960743460fd0b33f622324c7932ccf29dcf8eececb70270ddb003db1adad3175604c21495b6005931a4b8360c4e25d6a9d7d9b7e991

    • SSDEEP

      98304:fOmOrMFkEGXtR35mO/KNkhJhQO1jCQ6WmOuzSQxKYEBZoEl5jcys:HMR35mOCyd1aWmSYALne

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks