General

  • Target

    15f7e7c2071f6c50f6a4c9122eb04f2d0eb2d1380a2c4f1f2548f1040ba682ba

  • Size

    4.0MB

  • Sample

    220830-bn8knshffj

  • MD5

    6cee123a08c4abe14f9260912e94670c

  • SHA1

    3f9fa02cffb75efb677f1c80e6aea88e9c9992e4

  • SHA256

    15f7e7c2071f6c50f6a4c9122eb04f2d0eb2d1380a2c4f1f2548f1040ba682ba

  • SHA512

    9961efd7d8d20a1b48130dbc08e0b0ce8077e3695ac7f99ae8c99a72d8f8a4792f548edf43e2658e1903c946a1b1fd6f651dddc3c994daa943b751bbc2a0c610

  • SSDEEP

    98304:UJEsc65nQ3gI9hTArmnSGsfZ9706OzEvsCO1a+X:6EFMnWlTAr+Sdx970BMia+

Malware Config

Targets

    • Target

      15f7e7c2071f6c50f6a4c9122eb04f2d0eb2d1380a2c4f1f2548f1040ba682ba

    • Size

      4.0MB

    • MD5

      6cee123a08c4abe14f9260912e94670c

    • SHA1

      3f9fa02cffb75efb677f1c80e6aea88e9c9992e4

    • SHA256

      15f7e7c2071f6c50f6a4c9122eb04f2d0eb2d1380a2c4f1f2548f1040ba682ba

    • SHA512

      9961efd7d8d20a1b48130dbc08e0b0ce8077e3695ac7f99ae8c99a72d8f8a4792f548edf43e2658e1903c946a1b1fd6f651dddc3c994daa943b751bbc2a0c610

    • SSDEEP

      98304:UJEsc65nQ3gI9hTArmnSGsfZ9706OzEvsCO1a+X:6EFMnWlTAr+Sdx970BMia+

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks