General

  • Target

    65a5e90e39cf1116533f4b8db0a1452fafd6871f4603ad03e01908e809e174fe

  • Size

    4.0MB

  • Sample

    220830-ca144sbbc9

  • MD5

    f7916e363dd6174cf1cb6e74ff9fef02

  • SHA1

    7e2d640b5e1b077528e1fec599629af403d925c4

  • SHA256

    65a5e90e39cf1116533f4b8db0a1452fafd6871f4603ad03e01908e809e174fe

  • SHA512

    4865f19edf9c1cedce0247df318c59bd212f7592c698e82145212bf2f8ae5ada6cd33c35dd8d504a28b97dedb4a09c18d74b696c8fac21ea1fb02fbe0aad3809

  • SSDEEP

    98304:+lBwy/N5j+LTy2krRs9lkn0rjeym2NL1YNiuXgHz5:U/N5j+LWdRW20rTZNLWAuXg

Malware Config

Targets

    • Target

      65a5e90e39cf1116533f4b8db0a1452fafd6871f4603ad03e01908e809e174fe

    • Size

      4.0MB

    • MD5

      f7916e363dd6174cf1cb6e74ff9fef02

    • SHA1

      7e2d640b5e1b077528e1fec599629af403d925c4

    • SHA256

      65a5e90e39cf1116533f4b8db0a1452fafd6871f4603ad03e01908e809e174fe

    • SHA512

      4865f19edf9c1cedce0247df318c59bd212f7592c698e82145212bf2f8ae5ada6cd33c35dd8d504a28b97dedb4a09c18d74b696c8fac21ea1fb02fbe0aad3809

    • SSDEEP

      98304:+lBwy/N5j+LTy2krRs9lkn0rjeym2NL1YNiuXgHz5:U/N5j+LWdRW20rTZNLWAuXg

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks