General

  • Target

    9d82d028b5141a16ee0db50eab48694827bc4dc629e5d980b205d2687e232288

  • Size

    4.0MB

  • Sample

    220830-cm1n4sbdf5

  • MD5

    1f3c5bbfec2ba90b7b59b11a2bcf4ca6

  • SHA1

    1f7ed4be9df1fd248d60fbb15fca1931d6759e50

  • SHA256

    9d82d028b5141a16ee0db50eab48694827bc4dc629e5d980b205d2687e232288

  • SHA512

    d79367f409c8434481b05c36bd7b865fbf93bb7eafbbe48889b28cd4d9952707bb1632583d67405d4549049be1c6336352ad0586480ac08a1c46fc6ed2ac006b

  • SSDEEP

    98304:xFMNtfOfcFldIVz791+ioQuE446WPQucT2Ju069:DMVCCiQOAEJu5

Malware Config

Targets

    • Target

      9d82d028b5141a16ee0db50eab48694827bc4dc629e5d980b205d2687e232288

    • Size

      4.0MB

    • MD5

      1f3c5bbfec2ba90b7b59b11a2bcf4ca6

    • SHA1

      1f7ed4be9df1fd248d60fbb15fca1931d6759e50

    • SHA256

      9d82d028b5141a16ee0db50eab48694827bc4dc629e5d980b205d2687e232288

    • SHA512

      d79367f409c8434481b05c36bd7b865fbf93bb7eafbbe48889b28cd4d9952707bb1632583d67405d4549049be1c6336352ad0586480ac08a1c46fc6ed2ac006b

    • SSDEEP

      98304:xFMNtfOfcFldIVz791+ioQuE446WPQucT2Ju069:DMVCCiQOAEJu5

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks