General

  • Target

    8c0391f7670e8328b7c350bd9e144ecab2ab84434b15007b39ecf41d68d854aa

  • Size

    4.0MB

  • Sample

    220830-clhrxaacgm

  • MD5

    46c0d9c4e8db1eaf2687789644d39866

  • SHA1

    6f2c69937950d0282b707e9e98247dce569b3fdc

  • SHA256

    8c0391f7670e8328b7c350bd9e144ecab2ab84434b15007b39ecf41d68d854aa

  • SHA512

    7b7235357b039b8d8e39455982194aba1544684eda6adf72559878fc8ddd33e24ee602f9ee29d89108b42ed9becb175a9d6f58e4a56067a688a999e6219b0f42

  • SSDEEP

    98304:P12iEhf20tpcvJRdM+qi0gbGuB9/uFGYUxs15xaCRNL3VIx:PhO2mpcvJRXqHgbhYmGfd3V

Malware Config

Targets

    • Target

      8c0391f7670e8328b7c350bd9e144ecab2ab84434b15007b39ecf41d68d854aa

    • Size

      4.0MB

    • MD5

      46c0d9c4e8db1eaf2687789644d39866

    • SHA1

      6f2c69937950d0282b707e9e98247dce569b3fdc

    • SHA256

      8c0391f7670e8328b7c350bd9e144ecab2ab84434b15007b39ecf41d68d854aa

    • SHA512

      7b7235357b039b8d8e39455982194aba1544684eda6adf72559878fc8ddd33e24ee602f9ee29d89108b42ed9becb175a9d6f58e4a56067a688a999e6219b0f42

    • SSDEEP

      98304:P12iEhf20tpcvJRdM+qi0gbGuB9/uFGYUxs15xaCRNL3VIx:PhO2mpcvJRXqHgbhYmGfd3V

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks