General

  • Target

    81a5a53697afc28cac33953edb5825c4efb8688ea08432f97b69e8350d98dcc5

  • Size

    4.0MB

  • Sample

    220830-chsspsaccr

  • MD5

    f16d761675564d1e9c1ce2feafa5068f

  • SHA1

    2efd0c973f27fe19b680cc0a43708375f2e1f54f

  • SHA256

    81a5a53697afc28cac33953edb5825c4efb8688ea08432f97b69e8350d98dcc5

  • SHA512

    29046a24b7aa058943e900c0dc026453ecae70974e7c849dafad4c0931d89ea0653011b2a45348f8d82cab81addf3351295b55c1ca8ffaf1558dc03510dc5b2f

  • SSDEEP

    98304:8AD7WhnLXPdp/30Y8L01xkXXlyp1VB8LExTZAHnQz8:8DVPdp/30Y8DXEp138gxaHQz8

Malware Config

Targets

    • Target

      81a5a53697afc28cac33953edb5825c4efb8688ea08432f97b69e8350d98dcc5

    • Size

      4.0MB

    • MD5

      f16d761675564d1e9c1ce2feafa5068f

    • SHA1

      2efd0c973f27fe19b680cc0a43708375f2e1f54f

    • SHA256

      81a5a53697afc28cac33953edb5825c4efb8688ea08432f97b69e8350d98dcc5

    • SHA512

      29046a24b7aa058943e900c0dc026453ecae70974e7c849dafad4c0931d89ea0653011b2a45348f8d82cab81addf3351295b55c1ca8ffaf1558dc03510dc5b2f

    • SSDEEP

      98304:8AD7WhnLXPdp/30Y8L01xkXXlyp1VB8LExTZAHnQz8:8DVPdp/30Y8DXEp138gxaHQz8

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks