General

  • Target

    9df7176c20f48bc55b85306b49984ce616c6632b3afdcb68e93512f2633b53ec

  • Size

    4.0MB

  • Sample

    220830-cm4e1aadbl

  • MD5

    be6a47ee98b4111475dbd98d3d27be88

  • SHA1

    815761391418f0a61430b7b6a05d43c11647badd

  • SHA256

    9df7176c20f48bc55b85306b49984ce616c6632b3afdcb68e93512f2633b53ec

  • SHA512

    f6eab86f83595d100bf48f55d8b683dc3b04fd2232c7cf07f40cd0e6fef0a255ab12416a17ce3db976680478e430f55b478933a567dda0c2cdd9a164686409a5

  • SSDEEP

    98304:UCT3m/u18FLDmG+ul5cd130f9hTAF1GsXpwMwg1BxCThtih:NTm/LLSd1Ef9h6DXpw7uh

Malware Config

Targets

    • Target

      9df7176c20f48bc55b85306b49984ce616c6632b3afdcb68e93512f2633b53ec

    • Size

      4.0MB

    • MD5

      be6a47ee98b4111475dbd98d3d27be88

    • SHA1

      815761391418f0a61430b7b6a05d43c11647badd

    • SHA256

      9df7176c20f48bc55b85306b49984ce616c6632b3afdcb68e93512f2633b53ec

    • SHA512

      f6eab86f83595d100bf48f55d8b683dc3b04fd2232c7cf07f40cd0e6fef0a255ab12416a17ce3db976680478e430f55b478933a567dda0c2cdd9a164686409a5

    • SSDEEP

      98304:UCT3m/u18FLDmG+ul5cd130f9hTAF1GsXpwMwg1BxCThtih:NTm/LLSd1Ef9h6DXpw7uh

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks