General

  • Target

    8216f0831a442e0f386c9f7af6e34bf516a46b373757287037e2eb91a71c143f

  • Size

    4.0MB

  • Sample

    220830-cjacrabcg4

  • MD5

    a2247e2d681b29acc6fa1dc68c2ab231

  • SHA1

    cd2767a3438f6e48ace39fca0583801e13618229

  • SHA256

    8216f0831a442e0f386c9f7af6e34bf516a46b373757287037e2eb91a71c143f

  • SHA512

    ad1868aa8019aa2d358ed101e3a02d4a0a97a1c20edacd54216af081d7bd26506c4d8b05d424c9e5cb95508d9e07ba46d1562076b3e161131f14e832262c0d5e

  • SSDEEP

    98304:ideiIhWjD/6XnGDT1DFjgfYOiQzsHIxh56QG:ceibn6ODFbOiQzsoxh5

Malware Config

Targets

    • Target

      8216f0831a442e0f386c9f7af6e34bf516a46b373757287037e2eb91a71c143f

    • Size

      4.0MB

    • MD5

      a2247e2d681b29acc6fa1dc68c2ab231

    • SHA1

      cd2767a3438f6e48ace39fca0583801e13618229

    • SHA256

      8216f0831a442e0f386c9f7af6e34bf516a46b373757287037e2eb91a71c143f

    • SHA512

      ad1868aa8019aa2d358ed101e3a02d4a0a97a1c20edacd54216af081d7bd26506c4d8b05d424c9e5cb95508d9e07ba46d1562076b3e161131f14e832262c0d5e

    • SSDEEP

      98304:ideiIhWjD/6XnGDT1DFjgfYOiQzsHIxh56QG:ceibn6ODFbOiQzsoxh5

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks