General

  • Target

    94c9afa6decdffd81c21cc057720fd0b9f63eb23324c28b0bfe1b79d2fbe8967

  • Size

    4.0MB

  • Sample

    220830-cl577sachp

  • MD5

    260218734f5630ff01b971e7e608173d

  • SHA1

    6f6de1f5eec33c1ad763df5c2d7c2470d633ac8a

  • SHA256

    94c9afa6decdffd81c21cc057720fd0b9f63eb23324c28b0bfe1b79d2fbe8967

  • SHA512

    5923cd5e79beed2bb2f7b9164db71e1e2c4ba515136f23edb8d080ad34ff16bac26467a1db3442fe603c4d128110211e37375890eb2ef298537791d5291ab947

  • SSDEEP

    98304:w/0ayWy0zgH6bA55Nwkug2dsL6xX7YsgsN18ZhNXdvYIXjFM3:wHy0zga+xuJdi6pwsL8ZhfgIXpM3

Malware Config

Targets

    • Target

      94c9afa6decdffd81c21cc057720fd0b9f63eb23324c28b0bfe1b79d2fbe8967

    • Size

      4.0MB

    • MD5

      260218734f5630ff01b971e7e608173d

    • SHA1

      6f6de1f5eec33c1ad763df5c2d7c2470d633ac8a

    • SHA256

      94c9afa6decdffd81c21cc057720fd0b9f63eb23324c28b0bfe1b79d2fbe8967

    • SHA512

      5923cd5e79beed2bb2f7b9164db71e1e2c4ba515136f23edb8d080ad34ff16bac26467a1db3442fe603c4d128110211e37375890eb2ef298537791d5291ab947

    • SSDEEP

      98304:w/0ayWy0zgH6bA55Nwkug2dsL6xX7YsgsN18ZhNXdvYIXjFM3:wHy0zga+xuJdi6pwsL8ZhfgIXpM3

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks