General

  • Target

    9a734074c7190a12a3d0d7f9b163c56660673e932d2f65613ad7e1c04c61adca

  • Size

    4.0MB

  • Sample

    220830-cmgw1abde6

  • MD5

    a12744e96bef678dde29ac3537e598fd

  • SHA1

    4488277a53b1c5f1660880656f4ddde35765fce0

  • SHA256

    9a734074c7190a12a3d0d7f9b163c56660673e932d2f65613ad7e1c04c61adca

  • SHA512

    cc77a97b4bcafdb14a2189816d47c10ef960f9ea5eda11073f1e7c2a268dd4b04f37d594f7df46b0fa4eee837ed05fcc1f17c9de90fac9d4a2e42706510bfcc6

  • SSDEEP

    98304:W5bt7rKuVksbaPi+4N8O7vBx5KtT9hIwLdXsNWIOLuL6c:mRKuVksbaoN8O7vByLuqcNWtL66c

Malware Config

Targets

    • Target

      9a734074c7190a12a3d0d7f9b163c56660673e932d2f65613ad7e1c04c61adca

    • Size

      4.0MB

    • MD5

      a12744e96bef678dde29ac3537e598fd

    • SHA1

      4488277a53b1c5f1660880656f4ddde35765fce0

    • SHA256

      9a734074c7190a12a3d0d7f9b163c56660673e932d2f65613ad7e1c04c61adca

    • SHA512

      cc77a97b4bcafdb14a2189816d47c10ef960f9ea5eda11073f1e7c2a268dd4b04f37d594f7df46b0fa4eee837ed05fcc1f17c9de90fac9d4a2e42706510bfcc6

    • SSDEEP

      98304:W5bt7rKuVksbaPi+4N8O7vBx5KtT9hIwLdXsNWIOLuL6c:mRKuVksbaoN8O7vByLuqcNWtL66c

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks