General

  • Target

    2f6ef29d41e255dc87e7b0150764bc69d06aef3a1f9c54fe59bee3f1db5dc7c3

  • Size

    4.0MB

  • Sample

    220830-byys8aahe2

  • MD5

    dbd66747e72f5e7e409c4d212a205bc0

  • SHA1

    8190427d49dddc1f7d8cf86da9707108ef90bc19

  • SHA256

    2f6ef29d41e255dc87e7b0150764bc69d06aef3a1f9c54fe59bee3f1db5dc7c3

  • SHA512

    be53e5a9b0b6a743cc304297486c77c20250eec3314e1d93b35c4f16076c87cff476113a2271403ce20ed27e846f4cb610f742450100c8434eb0d50218edafc3

  • SSDEEP

    98304:z+6d5njPzUi5seSS2u092+In2VwkPd3IZ0ekOH:/Ln3Jt24nALWK

Malware Config

Targets

    • Target

      2f6ef29d41e255dc87e7b0150764bc69d06aef3a1f9c54fe59bee3f1db5dc7c3

    • Size

      4.0MB

    • MD5

      dbd66747e72f5e7e409c4d212a205bc0

    • SHA1

      8190427d49dddc1f7d8cf86da9707108ef90bc19

    • SHA256

      2f6ef29d41e255dc87e7b0150764bc69d06aef3a1f9c54fe59bee3f1db5dc7c3

    • SHA512

      be53e5a9b0b6a743cc304297486c77c20250eec3314e1d93b35c4f16076c87cff476113a2271403ce20ed27e846f4cb610f742450100c8434eb0d50218edafc3

    • SSDEEP

      98304:z+6d5njPzUi5seSS2u092+In2VwkPd3IZ0ekOH:/Ln3Jt24nALWK

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks