General

  • Target

    6f9457ce5bf1a8430bfe4f87f2b6374ff67a5b13c23cbebcd710158b1756fd8e

  • Size

    4.0MB

  • Sample

    220830-ceqh6sbbh8

  • MD5

    ad09f5884e2dc633a09e6bd9dda847d6

  • SHA1

    90516c0f5d4eb858007f5e289e7f923607f138c0

  • SHA256

    6f9457ce5bf1a8430bfe4f87f2b6374ff67a5b13c23cbebcd710158b1756fd8e

  • SHA512

    6e14585928024fa1fa8c1e98f081bd028dadc4bbcd034a90d43e2bcedce77df114b7b74eaeff8ad6815d27b33cb6d0af263af644f54feca809d30fa7c075e77d

  • SSDEEP

    98304:gCG7W7lIFvHcmst/tSs6cpgZBP5RarZIWIocK+cb4dcFjwJdkDW:gCWWCF0mst12dLGlIWVcKx4ujwJK

Malware Config

Targets

    • Target

      6f9457ce5bf1a8430bfe4f87f2b6374ff67a5b13c23cbebcd710158b1756fd8e

    • Size

      4.0MB

    • MD5

      ad09f5884e2dc633a09e6bd9dda847d6

    • SHA1

      90516c0f5d4eb858007f5e289e7f923607f138c0

    • SHA256

      6f9457ce5bf1a8430bfe4f87f2b6374ff67a5b13c23cbebcd710158b1756fd8e

    • SHA512

      6e14585928024fa1fa8c1e98f081bd028dadc4bbcd034a90d43e2bcedce77df114b7b74eaeff8ad6815d27b33cb6d0af263af644f54feca809d30fa7c075e77d

    • SSDEEP

      98304:gCG7W7lIFvHcmst/tSs6cpgZBP5RarZIWIocK+cb4dcFjwJdkDW:gCWWCF0mst12dLGlIWVcKx4ujwJK

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks