General

  • Target

    842d2cc4d04a5b9bd14eba10eb29476ec4709bb2a7ede0a5056d43a7c086e6af

  • Size

    4.0MB

  • Sample

    220830-cjzyeabda4

  • MD5

    1cd70426af9a82a96b94854a228a81c0

  • SHA1

    6a381521fb566212a6e87dd3f218b71a9017effb

  • SHA256

    842d2cc4d04a5b9bd14eba10eb29476ec4709bb2a7ede0a5056d43a7c086e6af

  • SHA512

    c4e4bbaf2b1126ecd5925548ca0638f35cb626ceccbbc455f3c78a88b5d3372a9cd11860e4ca0b2fe312eda5c3442ffc98bc32dae00cd8e179db17ead082b741

  • SSDEEP

    98304:vKsjPKYlf+6Nwf/+juH/8uFC+PjJ1LarEoY5FNLB:vKsjPKqwf/d/6+LJ1zF

Malware Config

Targets

    • Target

      842d2cc4d04a5b9bd14eba10eb29476ec4709bb2a7ede0a5056d43a7c086e6af

    • Size

      4.0MB

    • MD5

      1cd70426af9a82a96b94854a228a81c0

    • SHA1

      6a381521fb566212a6e87dd3f218b71a9017effb

    • SHA256

      842d2cc4d04a5b9bd14eba10eb29476ec4709bb2a7ede0a5056d43a7c086e6af

    • SHA512

      c4e4bbaf2b1126ecd5925548ca0638f35cb626ceccbbc455f3c78a88b5d3372a9cd11860e4ca0b2fe312eda5c3442ffc98bc32dae00cd8e179db17ead082b741

    • SSDEEP

      98304:vKsjPKYlf+6Nwf/+juH/8uFC+PjJ1LarEoY5FNLB:vKsjPKqwf/d/6+LJ1zF

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks