General

  • Target

    8b15d2bc31adb8497a725317f8af0fe7ad6eb74141aaf41e4da13bb61d1fb81a

  • Size

    4.0MB

  • Sample

    220830-ck246aacfn

  • MD5

    4e90d708b8813a0a9e44cadf67bd101e

  • SHA1

    a71c7d7eedc0f180b61f5781b4f8ca4e93ddbcb9

  • SHA256

    8b15d2bc31adb8497a725317f8af0fe7ad6eb74141aaf41e4da13bb61d1fb81a

  • SHA512

    0475f14da1f73d98d5767691b59f95e18df5a7c40a388ed17e7ee8c6b58992bac1e6d5c3f8341c335462b3858f7a1d6b614f0471ae67a412306bb5352627ee0e

  • SSDEEP

    98304:PvqIomm7x5vc2WIskx5791rOCAg8lNAO:8502WIt1qfDE

Malware Config

Targets

    • Target

      8b15d2bc31adb8497a725317f8af0fe7ad6eb74141aaf41e4da13bb61d1fb81a

    • Size

      4.0MB

    • MD5

      4e90d708b8813a0a9e44cadf67bd101e

    • SHA1

      a71c7d7eedc0f180b61f5781b4f8ca4e93ddbcb9

    • SHA256

      8b15d2bc31adb8497a725317f8af0fe7ad6eb74141aaf41e4da13bb61d1fb81a

    • SHA512

      0475f14da1f73d98d5767691b59f95e18df5a7c40a388ed17e7ee8c6b58992bac1e6d5c3f8341c335462b3858f7a1d6b614f0471ae67a412306bb5352627ee0e

    • SSDEEP

      98304:PvqIomm7x5vc2WIskx5791rOCAg8lNAO:8502WIt1qfDE

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks