General

  • Target

    65bd4d259ee5fc9f09aa15dd5eb5406a41b46a7e37f662bd740810cce4543702

  • Size

    4.0MB

  • Sample

    220830-ca78esbbd2

  • MD5

    7b1a51bc98c9640df17815951738f49e

  • SHA1

    9a81c0ee4913dc11cc10b1fe6ac9dea36f31a9d2

  • SHA256

    65bd4d259ee5fc9f09aa15dd5eb5406a41b46a7e37f662bd740810cce4543702

  • SHA512

    ff3c35a5ae3264b0c9bac99cdeb360eb3ea27f4620f93eb3a6184d6cd359efc7c4550f003f4904834925a77603432e54c947974eefc94d7d3d195cbbebd70b10

  • SSDEEP

    98304:SLgL33JHSphkl62XVCB9NZ57dk6uDIdHW85f1Ch+zX:cgLHJHhTVk957p4m5f1B

Malware Config

Targets

    • Target

      65bd4d259ee5fc9f09aa15dd5eb5406a41b46a7e37f662bd740810cce4543702

    • Size

      4.0MB

    • MD5

      7b1a51bc98c9640df17815951738f49e

    • SHA1

      9a81c0ee4913dc11cc10b1fe6ac9dea36f31a9d2

    • SHA256

      65bd4d259ee5fc9f09aa15dd5eb5406a41b46a7e37f662bd740810cce4543702

    • SHA512

      ff3c35a5ae3264b0c9bac99cdeb360eb3ea27f4620f93eb3a6184d6cd359efc7c4550f003f4904834925a77603432e54c947974eefc94d7d3d195cbbebd70b10

    • SSDEEP

      98304:SLgL33JHSphkl62XVCB9NZ57dk6uDIdHW85f1Ch+zX:cgLHJHhTVk957p4m5f1B

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks