General

  • Target

    1205caa377d76c902de1baa47bdf10ad9fc0ef329bc3fa3f399480be92d7a9d0

  • Size

    4.0MB

  • Sample

    220830-bmqcpsafg3

  • MD5

    de99f79d3eb276f052b796494d31c4ac

  • SHA1

    3d5c3d1db41fd0a3846cc253a423e13847c7ca96

  • SHA256

    1205caa377d76c902de1baa47bdf10ad9fc0ef329bc3fa3f399480be92d7a9d0

  • SHA512

    8e2901ab964e8af99924844427fabc38adf8c0c958b124bbcb4e3a5ae67c811cb1623dbf220b07673e387551181a4c618c39e5538ce850fef599aa5bbb0b8e39

  • SSDEEP

    98304:e11JeVpFzk1dC3rCGbr/h5IvE4JK2DO2pHOD0Vv:hZzk1s3rC0fqlg2DO6JV

Malware Config

Targets

    • Target

      1205caa377d76c902de1baa47bdf10ad9fc0ef329bc3fa3f399480be92d7a9d0

    • Size

      4.0MB

    • MD5

      de99f79d3eb276f052b796494d31c4ac

    • SHA1

      3d5c3d1db41fd0a3846cc253a423e13847c7ca96

    • SHA256

      1205caa377d76c902de1baa47bdf10ad9fc0ef329bc3fa3f399480be92d7a9d0

    • SHA512

      8e2901ab964e8af99924844427fabc38adf8c0c958b124bbcb4e3a5ae67c811cb1623dbf220b07673e387551181a4c618c39e5538ce850fef599aa5bbb0b8e39

    • SSDEEP

      98304:e11JeVpFzk1dC3rCGbr/h5IvE4JK2DO2pHOD0Vv:hZzk1s3rC0fqlg2DO6JV

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks