General

  • Target

    e3e73f85c8047b8e8ab35856bc3abb66a49190006efea50b5d858f992b61f011

  • Size

    4.0MB

  • Sample

    220831-18vlzsecf7

  • MD5

    a4e66d9c2001a53f8130f5e6c1c822a2

  • SHA1

    542e2b976f5311ff82c5690d0b6209458d79007d

  • SHA256

    e3e73f85c8047b8e8ab35856bc3abb66a49190006efea50b5d858f992b61f011

  • SHA512

    bdabe188bac92c4d3d01b95c4c22f0d55754eff039c44f59ca467ce999ccd9ed31a1c836d7aad1bcab8ff0722537fb55634fdcd550c70eef5b4784b3fb3da15e

  • SSDEEP

    49152:RiVYNDzeZ0Ab2LNMpqGQgPwJr7+2AzUsgo52ngn0qNctqROzQYVXlYUZ3qN6SoNq:RaYNH322Kpq8bco8gn9GqszQyVyNvAw

Malware Config

Targets

    • Target

      e3e73f85c8047b8e8ab35856bc3abb66a49190006efea50b5d858f992b61f011

    • Size

      4.0MB

    • MD5

      a4e66d9c2001a53f8130f5e6c1c822a2

    • SHA1

      542e2b976f5311ff82c5690d0b6209458d79007d

    • SHA256

      e3e73f85c8047b8e8ab35856bc3abb66a49190006efea50b5d858f992b61f011

    • SHA512

      bdabe188bac92c4d3d01b95c4c22f0d55754eff039c44f59ca467ce999ccd9ed31a1c836d7aad1bcab8ff0722537fb55634fdcd550c70eef5b4784b3fb3da15e

    • SSDEEP

      49152:RiVYNDzeZ0Ab2LNMpqGQgPwJr7+2AzUsgo52ngn0qNctqROzQYVXlYUZ3qN6SoNq:RaYNH322Kpq8bco8gn9GqszQyVyNvAw

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks