General

  • Target

    8e656eb57d8d6969fc7a40fb639efede124ad581a71fcb5bde94a944013f793c

  • Size

    4.0MB

  • Sample

    220830-cl1ygsachn

  • MD5

    87a6f7b559ff3eaa4789313567f7b331

  • SHA1

    d61df33e9a80ce68b4d17b49c8d9822a081aecf6

  • SHA256

    8e656eb57d8d6969fc7a40fb639efede124ad581a71fcb5bde94a944013f793c

  • SHA512

    d25871d372b8b91883c422d5d690980893a4b60e7d433b383adc3a726baddf478bce828abd150a85bab01c3bdd182efe5d063bfd69090652d37cc417ee4f1ceb

  • SSDEEP

    98304:Nv1wv7D8leVdvBmQc32rGeEw3Jn7GiLIfjD9TbF6wT7Q7S2V+:l1wv7DxTvBSAxEen7VYTbFzT7Q7

Malware Config

Targets

    • Target

      8e656eb57d8d6969fc7a40fb639efede124ad581a71fcb5bde94a944013f793c

    • Size

      4.0MB

    • MD5

      87a6f7b559ff3eaa4789313567f7b331

    • SHA1

      d61df33e9a80ce68b4d17b49c8d9822a081aecf6

    • SHA256

      8e656eb57d8d6969fc7a40fb639efede124ad581a71fcb5bde94a944013f793c

    • SHA512

      d25871d372b8b91883c422d5d690980893a4b60e7d433b383adc3a726baddf478bce828abd150a85bab01c3bdd182efe5d063bfd69090652d37cc417ee4f1ceb

    • SSDEEP

      98304:Nv1wv7D8leVdvBmQc32rGeEw3Jn7GiLIfjD9TbF6wT7Q7S2V+:l1wv7DxTvBSAxEen7VYTbFzT7Q7

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks