General

  • Target

    7fb606eca28169f15da8ebaa3b4603d7520220ccfb8c8b21d82d8dbc3005298f

  • Size

    4.0MB

  • Sample

    220830-cg7kgabce8

  • MD5

    6b27f72e240121907ba1e0986afde40f

  • SHA1

    66170f155d08a33ce7f53bbc6d4008a4fb995c2e

  • SHA256

    7fb606eca28169f15da8ebaa3b4603d7520220ccfb8c8b21d82d8dbc3005298f

  • SHA512

    fdbd40142f283583946c87e73f4e01da1f215a1959838667cf284fee783e6f89dea77975fcdd96db62746c83f00d019821a3a56a23b0cb842f878dc9a111978b

  • SSDEEP

    98304:TnDBmNRYVsux7F4xd2kvc1LN5JSVfBxNhtpDtPQhJ6hu0KThd1:TDBMRgsmAWnJSVpbDpDtYhJ6huxFd

Malware Config

Targets

    • Target

      7fb606eca28169f15da8ebaa3b4603d7520220ccfb8c8b21d82d8dbc3005298f

    • Size

      4.0MB

    • MD5

      6b27f72e240121907ba1e0986afde40f

    • SHA1

      66170f155d08a33ce7f53bbc6d4008a4fb995c2e

    • SHA256

      7fb606eca28169f15da8ebaa3b4603d7520220ccfb8c8b21d82d8dbc3005298f

    • SHA512

      fdbd40142f283583946c87e73f4e01da1f215a1959838667cf284fee783e6f89dea77975fcdd96db62746c83f00d019821a3a56a23b0cb842f878dc9a111978b

    • SSDEEP

      98304:TnDBmNRYVsux7F4xd2kvc1LN5JSVfBxNhtpDtPQhJ6hu0KThd1:TDBMRgsmAWnJSVpbDpDtYhJ6huxFd

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks