General

  • Target

    6d90e78dfedb1a068d39c34051afcd6b6d98a4f43d7203d570a514f170f984b6

  • Size

    4.0MB

  • Sample

    220830-cdy4xsabgp

  • MD5

    d2f19c27bbb3a335ab0593c3c879f07c

  • SHA1

    e67b70dd4a81f46fb7294f4e1053a19e6aed1d86

  • SHA256

    6d90e78dfedb1a068d39c34051afcd6b6d98a4f43d7203d570a514f170f984b6

  • SHA512

    316511f2015110b8e2dfe7ca1c7955572e0dd343223fbc2c445dadd932cfd69c19fde42bc74f1eade3d1ad9e47e134d433f6df5c68d58ecf0e3757aad5d057ee

  • SSDEEP

    98304:tc4Z1MAB6reRQ5r2Trf36ER1J6u6XbmANDaG4n1x45:tcUMAB6reRQ52fSEHJHaClGGS

Malware Config

Targets

    • Target

      6d90e78dfedb1a068d39c34051afcd6b6d98a4f43d7203d570a514f170f984b6

    • Size

      4.0MB

    • MD5

      d2f19c27bbb3a335ab0593c3c879f07c

    • SHA1

      e67b70dd4a81f46fb7294f4e1053a19e6aed1d86

    • SHA256

      6d90e78dfedb1a068d39c34051afcd6b6d98a4f43d7203d570a514f170f984b6

    • SHA512

      316511f2015110b8e2dfe7ca1c7955572e0dd343223fbc2c445dadd932cfd69c19fde42bc74f1eade3d1ad9e47e134d433f6df5c68d58ecf0e3757aad5d057ee

    • SSDEEP

      98304:tc4Z1MAB6reRQ5r2Trf36ER1J6u6XbmANDaG4n1x45:tcUMAB6reRQ52fSEHJHaClGGS

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks