General

  • Target

    8b96d21f211fffee984eef42d1628d9ae416e7c5a609304aa343552b7fa28f59

  • Size

    4.0MB

  • Sample

    220830-ck88gaacgj

  • MD5

    1b0ca419190ec26ca96315dd0d0c0825

  • SHA1

    3dcafee02abd721f026cb7021744931decaffd68

  • SHA256

    8b96d21f211fffee984eef42d1628d9ae416e7c5a609304aa343552b7fa28f59

  • SHA512

    9348520c149cf78bd4540dd3546d9e1cbdc0835cd8e5fb893cfd2b207ad5bdcd4a9860bbbe713d04ebcbd5865c8170348b9ff5edf3e9d5fffaae338b5d248aba

  • SSDEEP

    98304:B7ZwwFFhG5SQ4URNywPeElm46ucNulbTGWqyvko4HcWY:5Zww9GgdURNKt46ucNuVbqIx

Malware Config

Targets

    • Target

      8b96d21f211fffee984eef42d1628d9ae416e7c5a609304aa343552b7fa28f59

    • Size

      4.0MB

    • MD5

      1b0ca419190ec26ca96315dd0d0c0825

    • SHA1

      3dcafee02abd721f026cb7021744931decaffd68

    • SHA256

      8b96d21f211fffee984eef42d1628d9ae416e7c5a609304aa343552b7fa28f59

    • SHA512

      9348520c149cf78bd4540dd3546d9e1cbdc0835cd8e5fb893cfd2b207ad5bdcd4a9860bbbe713d04ebcbd5865c8170348b9ff5edf3e9d5fffaae338b5d248aba

    • SSDEEP

      98304:B7ZwwFFhG5SQ4URNywPeElm46ucNulbTGWqyvko4HcWY:5Zww9GgdURNKt46ucNuVbqIx

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks