General

  • Target

    8d8f28e25528bfc43bb60c71f3634b09675ee5aeba9b2fb6b270d7802f045779

  • Size

    4.0MB

  • Sample

    220830-clwzjabdd8

  • MD5

    78d8e74f1997ab70afe7227165e19ffb

  • SHA1

    32a0edb54df1fdbc35f357734006ac56b8cd1b84

  • SHA256

    8d8f28e25528bfc43bb60c71f3634b09675ee5aeba9b2fb6b270d7802f045779

  • SHA512

    c29488dfada1e2f66fbe630a65e3526f703ff2b369d89ae427a654d08c8633f32a8c70726a35e370ed976d77b66b7e547f1cdd8eee5e172f9971576c5575a3db

  • SSDEEP

    98304:WYWKgBoz83R2PLIln/HkrsP2tC9j2lXdpNPZa:WYxgBoz0RYGZAC9j2tpN

Malware Config

Targets

    • Target

      8d8f28e25528bfc43bb60c71f3634b09675ee5aeba9b2fb6b270d7802f045779

    • Size

      4.0MB

    • MD5

      78d8e74f1997ab70afe7227165e19ffb

    • SHA1

      32a0edb54df1fdbc35f357734006ac56b8cd1b84

    • SHA256

      8d8f28e25528bfc43bb60c71f3634b09675ee5aeba9b2fb6b270d7802f045779

    • SHA512

      c29488dfada1e2f66fbe630a65e3526f703ff2b369d89ae427a654d08c8633f32a8c70726a35e370ed976d77b66b7e547f1cdd8eee5e172f9971576c5575a3db

    • SSDEEP

      98304:WYWKgBoz83R2PLIln/HkrsP2tC9j2lXdpNPZa:WYxgBoz0RYGZAC9j2tpN

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks