General

  • Target

    6794f0cf8f94eb7341e6612464e886a2efd66a3e4167138525cfdc820a677f21

  • Size

    4.0MB

  • Sample

    220830-cbt27abbe4

  • MD5

    37e44532579ab5261e9ce53d8d45cee6

  • SHA1

    da3981208d319a6512da41dd0ab1619903669f39

  • SHA256

    6794f0cf8f94eb7341e6612464e886a2efd66a3e4167138525cfdc820a677f21

  • SHA512

    8088767a2653e6a7de83c659e4b6ffe47bdc0c4fbadf1bb16be2dcb1530dc79c351060966e44f9da85d946eef845d5e84fd8baea6a547c015811b1b81e230733

  • SSDEEP

    98304:y2pxutwbZ2GKkb5tZIOhNvJXdxIPJiCEWvHvhab:tXtAkb5tZIOhtZIP7pH8b

Malware Config

Targets

    • Target

      6794f0cf8f94eb7341e6612464e886a2efd66a3e4167138525cfdc820a677f21

    • Size

      4.0MB

    • MD5

      37e44532579ab5261e9ce53d8d45cee6

    • SHA1

      da3981208d319a6512da41dd0ab1619903669f39

    • SHA256

      6794f0cf8f94eb7341e6612464e886a2efd66a3e4167138525cfdc820a677f21

    • SHA512

      8088767a2653e6a7de83c659e4b6ffe47bdc0c4fbadf1bb16be2dcb1530dc79c351060966e44f9da85d946eef845d5e84fd8baea6a547c015811b1b81e230733

    • SSDEEP

      98304:y2pxutwbZ2GKkb5tZIOhNvJXdxIPJiCEWvHvhab:tXtAkb5tZIOhtZIP7pH8b

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks