General

  • Target

    86f037e97d7d843511e7ae743c2c142a725ffe9d39e6c22254292c943b2e2f9e

  • Size

    4.0MB

  • Sample

    220830-ckezmabda7

  • MD5

    2aa9bbb5dfb8a9e4f43d837678bbba32

  • SHA1

    a3f5c88e1b1a00f619a844e3acc3b0522827460e

  • SHA256

    86f037e97d7d843511e7ae743c2c142a725ffe9d39e6c22254292c943b2e2f9e

  • SHA512

    9199505c1034371aa40c7897d03e4b1bee9571ea2129b0b3ae3fefd600e0199e11eb39b9c357bc1fe50ec93a7c0593d0ba88485bed492271a01886f1993e01ac

  • SSDEEP

    98304:tmS04ZDOdjtOfrR9cPDl6GpVM5KJtklsFICNxDKDhe0Q5r6MRgPzdLS0:4T4tkjtOfrypHpVM5KglsFICUhfsgPz

Malware Config

Targets

    • Target

      86f037e97d7d843511e7ae743c2c142a725ffe9d39e6c22254292c943b2e2f9e

    • Size

      4.0MB

    • MD5

      2aa9bbb5dfb8a9e4f43d837678bbba32

    • SHA1

      a3f5c88e1b1a00f619a844e3acc3b0522827460e

    • SHA256

      86f037e97d7d843511e7ae743c2c142a725ffe9d39e6c22254292c943b2e2f9e

    • SHA512

      9199505c1034371aa40c7897d03e4b1bee9571ea2129b0b3ae3fefd600e0199e11eb39b9c357bc1fe50ec93a7c0593d0ba88485bed492271a01886f1993e01ac

    • SSDEEP

      98304:tmS04ZDOdjtOfrR9cPDl6GpVM5KJtklsFICNxDKDhe0Q5r6MRgPzdLS0:4T4tkjtOfrypHpVM5KglsFICUhfsgPz

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks