General

  • Target

    9e011b657e5db42572fc99453f42cb355fe8905712f4fae62b0f054e8a7ad70c

  • Size

    4.0MB

  • Sample

    220830-cnajbaadbm

  • MD5

    ec2c8796b217fc8a0b48b1f54c3d9b06

  • SHA1

    8fdd1448ae5ee4f71b29fcb4d76387eaf755731d

  • SHA256

    9e011b657e5db42572fc99453f42cb355fe8905712f4fae62b0f054e8a7ad70c

  • SHA512

    3901b92510069f59a8fb7ca692350b8394ecb366f3487fadd427b1743aa2754c96ec13d066b064ba9074b3f5dc988ee049daf726226dbef4657c882d5161afd1

  • SSDEEP

    98304:olaID4enucEC9TAQe47OR9vMHYFlmFhJMtcf17uuFUSiPY3FP:ocID43C9EL429kelmzJiWuuFUSiPYV

Malware Config

Targets

    • Target

      9e011b657e5db42572fc99453f42cb355fe8905712f4fae62b0f054e8a7ad70c

    • Size

      4.0MB

    • MD5

      ec2c8796b217fc8a0b48b1f54c3d9b06

    • SHA1

      8fdd1448ae5ee4f71b29fcb4d76387eaf755731d

    • SHA256

      9e011b657e5db42572fc99453f42cb355fe8905712f4fae62b0f054e8a7ad70c

    • SHA512

      3901b92510069f59a8fb7ca692350b8394ecb366f3487fadd427b1743aa2754c96ec13d066b064ba9074b3f5dc988ee049daf726226dbef4657c882d5161afd1

    • SSDEEP

      98304:olaID4enucEC9TAQe47OR9vMHYFlmFhJMtcf17uuFUSiPY3FP:ocID43C9EL429kelmzJiWuuFUSiPYV

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks