General

  • Target

    26fed2c1dd8f187471dc4566117565dd34451aa4401fc2b271aa9de60df3aecb

  • Size

    4.0MB

  • Sample

    220830-bvxfzshgej

  • MD5

    efb547309c1d3f1d88dbeaea67624002

  • SHA1

    1ed73f37b906652a976c5d7c377685f7f0e8f1c9

  • SHA256

    26fed2c1dd8f187471dc4566117565dd34451aa4401fc2b271aa9de60df3aecb

  • SHA512

    4d38e8595e6bed32b99ffcdad16baa6983e3728a12dae3a918baf47e962c3b14dca2f2279b25fbbe3d805f90f99898bc458ae3347873945fbb30f974eeb347bd

  • SSDEEP

    98304:7kS/7Kih5RIZdoDMowznI6hAK9stW/Jjo55CS5n8ZTuCt2a:7kSK85EdOV6nI6mfkJ+CqCTue

Malware Config

Targets

    • Target

      26fed2c1dd8f187471dc4566117565dd34451aa4401fc2b271aa9de60df3aecb

    • Size

      4.0MB

    • MD5

      efb547309c1d3f1d88dbeaea67624002

    • SHA1

      1ed73f37b906652a976c5d7c377685f7f0e8f1c9

    • SHA256

      26fed2c1dd8f187471dc4566117565dd34451aa4401fc2b271aa9de60df3aecb

    • SHA512

      4d38e8595e6bed32b99ffcdad16baa6983e3728a12dae3a918baf47e962c3b14dca2f2279b25fbbe3d805f90f99898bc458ae3347873945fbb30f974eeb347bd

    • SSDEEP

      98304:7kS/7Kih5RIZdoDMowznI6hAK9stW/Jjo55CS5n8ZTuCt2a:7kSK85EdOV6nI6mfkJ+CqCTue

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks