General

  • Target

    14e106b1a88caf69548d48e70cea3f5fc5c8975f08c6dd9e0444db8856cd37e8

  • Size

    4.0MB

  • Sample

    220830-bnvc2shfdn

  • MD5

    d727184f39736356fe1d628b0ff52ad7

  • SHA1

    ef7a659e3390336a09bdb88fd87a24d4fd9c83e6

  • SHA256

    14e106b1a88caf69548d48e70cea3f5fc5c8975f08c6dd9e0444db8856cd37e8

  • SHA512

    eabc208c6e4835b4714e8b4edc3b1eedc25c99ddb78cd67e192186ff449478cef90bc546cb14f8810a3d87f5f3bca391063d7c80d053ce908402b30c17e3302a

  • SSDEEP

    98304:98Tb6rokAvUiNnPnyGQe5bzAcLLHcTHlSxDBaRRw8GTkceDch:+Tc9WnP7QeFPfKoEqOs

Malware Config

Targets

    • Target

      14e106b1a88caf69548d48e70cea3f5fc5c8975f08c6dd9e0444db8856cd37e8

    • Size

      4.0MB

    • MD5

      d727184f39736356fe1d628b0ff52ad7

    • SHA1

      ef7a659e3390336a09bdb88fd87a24d4fd9c83e6

    • SHA256

      14e106b1a88caf69548d48e70cea3f5fc5c8975f08c6dd9e0444db8856cd37e8

    • SHA512

      eabc208c6e4835b4714e8b4edc3b1eedc25c99ddb78cd67e192186ff449478cef90bc546cb14f8810a3d87f5f3bca391063d7c80d053ce908402b30c17e3302a

    • SSDEEP

      98304:98Tb6rokAvUiNnPnyGQe5bzAcLLHcTHlSxDBaRRw8GTkceDch:+Tc9WnP7QeFPfKoEqOs

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks