General

  • Target

    2ce48756043a29d1bf6cbf7f54a926036b47f29ddcaa22092d56954635086923

  • Size

    4.0MB

  • Sample

    220830-bxn8dshggn

  • MD5

    5fc1bd2c88e8fc11a9fe98bc9f0e3e12

  • SHA1

    af9ad1a74ffd4824eb0ab24729d671305cf9a73a

  • SHA256

    2ce48756043a29d1bf6cbf7f54a926036b47f29ddcaa22092d56954635086923

  • SHA512

    81ab699bce6d6ad2143dcd0a0ba7a5c9019bf0ce3cea1f618818d6937258097b14c37efeaf6c7ab0b4e51182471317e8f0e3d49e5d673547896c3c3498f42e45

  • SSDEEP

    98304:gLePQnw0CRdjmoKDuOhsfG0W+xz7lPHvqhhAJrxPH6LIjjjT1:gyPQnprBBcPPqhhKcI7

Malware Config

Targets

    • Target

      2ce48756043a29d1bf6cbf7f54a926036b47f29ddcaa22092d56954635086923

    • Size

      4.0MB

    • MD5

      5fc1bd2c88e8fc11a9fe98bc9f0e3e12

    • SHA1

      af9ad1a74ffd4824eb0ab24729d671305cf9a73a

    • SHA256

      2ce48756043a29d1bf6cbf7f54a926036b47f29ddcaa22092d56954635086923

    • SHA512

      81ab699bce6d6ad2143dcd0a0ba7a5c9019bf0ce3cea1f618818d6937258097b14c37efeaf6c7ab0b4e51182471317e8f0e3d49e5d673547896c3c3498f42e45

    • SSDEEP

      98304:gLePQnw0CRdjmoKDuOhsfG0W+xz7lPHvqhhAJrxPH6LIjjjT1:gyPQnprBBcPPqhhKcI7

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks