General

  • Target

    090c7252a135fc07a76346d91cfc05434b5b3fe72b7eaf40a99ae44f4c0d9058

  • Size

    4.0MB

  • Sample

    220830-blsrfaaff7

  • MD5

    1185a7ea8363092504eab6f64dbc24e1

  • SHA1

    a02c270b6f424775d25d03d3269f6e2b2fd0da0c

  • SHA256

    090c7252a135fc07a76346d91cfc05434b5b3fe72b7eaf40a99ae44f4c0d9058

  • SHA512

    770f597b00a08edf3dabfcde9aedee45dfbab9de4f28f1076635b6f7af8ab14fa74786af952831ca83b844cbfff847727787f1d12ea0c0cc1dd5c80714dc627c

  • SSDEEP

    98304:I1sRV+GJ90bZwtnXlio1/FFPwryoFMt1a4N:2sj+Ix1iorFPwrdGt8

Malware Config

Targets

    • Target

      090c7252a135fc07a76346d91cfc05434b5b3fe72b7eaf40a99ae44f4c0d9058

    • Size

      4.0MB

    • MD5

      1185a7ea8363092504eab6f64dbc24e1

    • SHA1

      a02c270b6f424775d25d03d3269f6e2b2fd0da0c

    • SHA256

      090c7252a135fc07a76346d91cfc05434b5b3fe72b7eaf40a99ae44f4c0d9058

    • SHA512

      770f597b00a08edf3dabfcde9aedee45dfbab9de4f28f1076635b6f7af8ab14fa74786af952831ca83b844cbfff847727787f1d12ea0c0cc1dd5c80714dc627c

    • SSDEEP

      98304:I1sRV+GJ90bZwtnXlio1/FFPwryoFMt1a4N:2sj+Ix1iorFPwrdGt8

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks