General

  • Target

    9cb41dfabb8a0179cc046f174c27e3106c14c4518eccec7b36a3533655559908

  • Size

    4.0MB

  • Sample

    220830-cmqh5sbde7

  • MD5

    9ea2e282fbec5301f574b7860156376b

  • SHA1

    997da7e453500b7efe7f92e19b8686a282c42e83

  • SHA256

    9cb41dfabb8a0179cc046f174c27e3106c14c4518eccec7b36a3533655559908

  • SHA512

    a5dfb350e22bea6c4469364bcd4d88d09c748694c8b118cca167c5e45874ed47c70da30f470174e534370bc01732f3440ac92781ac8781325e1ef743c3211c17

  • SSDEEP

    98304:F8+GiNFxYcJirA7zIZ317m5DZ8WiHLiJr7wqO+wXO6xApnig9t:5xJfE3tm5d8WiHLiJAPTXzApP

Malware Config

Targets

    • Target

      9cb41dfabb8a0179cc046f174c27e3106c14c4518eccec7b36a3533655559908

    • Size

      4.0MB

    • MD5

      9ea2e282fbec5301f574b7860156376b

    • SHA1

      997da7e453500b7efe7f92e19b8686a282c42e83

    • SHA256

      9cb41dfabb8a0179cc046f174c27e3106c14c4518eccec7b36a3533655559908

    • SHA512

      a5dfb350e22bea6c4469364bcd4d88d09c748694c8b118cca167c5e45874ed47c70da30f470174e534370bc01732f3440ac92781ac8781325e1ef743c3211c17

    • SSDEEP

      98304:F8+GiNFxYcJirA7zIZ317m5DZ8WiHLiJr7wqO+wXO6xApnig9t:5xJfE3tm5d8WiHLiJAPTXzApP

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks