General

  • Target

    86a48d9784884f77ad0b28400f1c0e0345957b4b89eb869e25855a0c32810406

  • Size

    4.0MB

  • Sample

    220830-cj6e7aacel

  • MD5

    e8e085377ca44d8e7bfb9870d6d49c2a

  • SHA1

    e2fa0609d1cf893acf2f67592e86b8e28195f2a7

  • SHA256

    86a48d9784884f77ad0b28400f1c0e0345957b4b89eb869e25855a0c32810406

  • SHA512

    fdbe002b6d8828985cb7c860bcca7f1f05d1a2d31ef4e2917a6df0136afa3101bef07ebd412e498f1613fa93b86248c68bd89e70546d056e6307a35f742a37e4

  • SSDEEP

    98304:AEqckfv9VtdxXUHee8GegPF08sENAjdNmmbYc/CgrjhERvR4qsuhBjp8SvaUb:Kv9Hdx8eddgPuV3xN58aV3h0OufV8M

Malware Config

Targets

    • Target

      86a48d9784884f77ad0b28400f1c0e0345957b4b89eb869e25855a0c32810406

    • Size

      4.0MB

    • MD5

      e8e085377ca44d8e7bfb9870d6d49c2a

    • SHA1

      e2fa0609d1cf893acf2f67592e86b8e28195f2a7

    • SHA256

      86a48d9784884f77ad0b28400f1c0e0345957b4b89eb869e25855a0c32810406

    • SHA512

      fdbe002b6d8828985cb7c860bcca7f1f05d1a2d31ef4e2917a6df0136afa3101bef07ebd412e498f1613fa93b86248c68bd89e70546d056e6307a35f742a37e4

    • SSDEEP

      98304:AEqckfv9VtdxXUHee8GegPF08sENAjdNmmbYc/CgrjhERvR4qsuhBjp8SvaUb:Kv9Hdx8eddgPuV3xN58aV3h0OufV8M

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks