General

  • Target

    88e20ad657048d5785d55070bd21f1c6a7a13624f4e2f87401c2bdb0906632cf

  • Size

    4.0MB

  • Sample

    220830-ckx57sbdc3

  • MD5

    5b1ff119e06ec333adc1f284581ef7b1

  • SHA1

    f3623b92f1d71ccb40e64504c46523dfc36ff702

  • SHA256

    88e20ad657048d5785d55070bd21f1c6a7a13624f4e2f87401c2bdb0906632cf

  • SHA512

    61e9095a608fc789ba5c53ac0c5fbe17cbedf4e488e9e55ac799dd50fc530c7d4bdf4d2bc151b035f32872cf586ed560765bfca94fe73bd6d2b36e8ebe728575

  • SSDEEP

    98304:jDDKgjzKxYXmWdWvJN23D65qCLWcnx85qhLWuISNCQJN3:HmgjuxtLx8m5pWUeCHNCQP3

Malware Config

Targets

    • Target

      88e20ad657048d5785d55070bd21f1c6a7a13624f4e2f87401c2bdb0906632cf

    • Size

      4.0MB

    • MD5

      5b1ff119e06ec333adc1f284581ef7b1

    • SHA1

      f3623b92f1d71ccb40e64504c46523dfc36ff702

    • SHA256

      88e20ad657048d5785d55070bd21f1c6a7a13624f4e2f87401c2bdb0906632cf

    • SHA512

      61e9095a608fc789ba5c53ac0c5fbe17cbedf4e488e9e55ac799dd50fc530c7d4bdf4d2bc151b035f32872cf586ed560765bfca94fe73bd6d2b36e8ebe728575

    • SSDEEP

      98304:jDDKgjzKxYXmWdWvJN23D65qCLWcnx85qhLWuISNCQJN3:HmgjuxtLx8m5pWUeCHNCQP3

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks