General

  • Target

    30db81495da8ed2569c3d3db00ad3f475b808b1384d8ac1374a30773b9164ed9

  • Size

    4.0MB

  • Sample

    220830-bzkmzsahf4

  • MD5

    a35dde4d696eae7395a9770456a2f6d6

  • SHA1

    5a351bb8cb5fc5e336faf84094af9aa7bfe12801

  • SHA256

    30db81495da8ed2569c3d3db00ad3f475b808b1384d8ac1374a30773b9164ed9

  • SHA512

    a4123d86ca313842ed343762319a0c69b4b8e06f29a47ea9cc0019fc4f6240ed7b997145f5b555daf03e22935015b2cc299f3df1bec338151735425b91ec3822

  • SSDEEP

    98304:otzxFM8z4xO7C7hTV/V4OoOt6XsWE/wS:otzxFMo4V9V4OoE/

Malware Config

Targets

    • Target

      30db81495da8ed2569c3d3db00ad3f475b808b1384d8ac1374a30773b9164ed9

    • Size

      4.0MB

    • MD5

      a35dde4d696eae7395a9770456a2f6d6

    • SHA1

      5a351bb8cb5fc5e336faf84094af9aa7bfe12801

    • SHA256

      30db81495da8ed2569c3d3db00ad3f475b808b1384d8ac1374a30773b9164ed9

    • SHA512

      a4123d86ca313842ed343762319a0c69b4b8e06f29a47ea9cc0019fc4f6240ed7b997145f5b555daf03e22935015b2cc299f3df1bec338151735425b91ec3822

    • SSDEEP

      98304:otzxFM8z4xO7C7hTV/V4OoOt6XsWE/wS:otzxFMo4V9V4OoE/

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks