General

  • Target

    5f195ca22e44063b490ecfc8043ff3fa6166748787c8891b351f071882e45b12

  • Size

    4.0MB

  • Sample

    220830-cadzksabal

  • MD5

    14dfd246576f67ae18b8623b30470cda

  • SHA1

    0b3e8114eca796e3f583fec3adc230f69e67aedc

  • SHA256

    5f195ca22e44063b490ecfc8043ff3fa6166748787c8891b351f071882e45b12

  • SHA512

    44d1277354de71d7841172d8858176a4650cd16ccd32eb5cf733742a3676f478d46b9ee8681d3d26a5123f7d5cf663613b7813b5c3b7bd9d2733880ace70aa89

  • SSDEEP

    98304:/HryMOwf/GGQmJhRTGI0msbfvIFS/Pg+8M6HpucD4oX:/Hryjwf/GvmJHTGIBssMPBCAboX

Malware Config

Targets

    • Target

      5f195ca22e44063b490ecfc8043ff3fa6166748787c8891b351f071882e45b12

    • Size

      4.0MB

    • MD5

      14dfd246576f67ae18b8623b30470cda

    • SHA1

      0b3e8114eca796e3f583fec3adc230f69e67aedc

    • SHA256

      5f195ca22e44063b490ecfc8043ff3fa6166748787c8891b351f071882e45b12

    • SHA512

      44d1277354de71d7841172d8858176a4650cd16ccd32eb5cf733742a3676f478d46b9ee8681d3d26a5123f7d5cf663613b7813b5c3b7bd9d2733880ace70aa89

    • SSDEEP

      98304:/HryMOwf/GGQmJhRTGI0msbfvIFS/Pg+8M6HpucD4oX:/Hryjwf/GvmJHTGIBssMPBCAboX

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks