General

  • Target

    a7bceb417fbb8c136261f3b195d6d7ee.exe

  • Size

    4.0MB

  • Sample

    220831-kybhcsdec9

  • MD5

    a7bceb417fbb8c136261f3b195d6d7ee

  • SHA1

    82f78abd9ffd6298e599e05826cc2ec237758a9c

  • SHA256

    3595487037dcf807ce3a99232518787290b0a37e56eb63ee62901929b9974277

  • SHA512

    a5ea37145dbd81bc117b527fba56c68d2b7ef4f5f0d1b965cb2525019794403402733a22bf533dbbf6efe58ca0afc9f433c27464dda42d576daa06b6f707a3e5

  • SSDEEP

    98304:abHZ1MFWV8qtEJlzQ1fv7ltH2HhcPxthrWyKKbCg:gzM0VTt41Qhz2EvhrWyKKbR

Malware Config

Targets

    • Target

      a7bceb417fbb8c136261f3b195d6d7ee.exe

    • Size

      4.0MB

    • MD5

      a7bceb417fbb8c136261f3b195d6d7ee

    • SHA1

      82f78abd9ffd6298e599e05826cc2ec237758a9c

    • SHA256

      3595487037dcf807ce3a99232518787290b0a37e56eb63ee62901929b9974277

    • SHA512

      a5ea37145dbd81bc117b527fba56c68d2b7ef4f5f0d1b965cb2525019794403402733a22bf533dbbf6efe58ca0afc9f433c27464dda42d576daa06b6f707a3e5

    • SSDEEP

      98304:abHZ1MFWV8qtEJlzQ1fv7ltH2HhcPxthrWyKKbCg:gzM0VTt41Qhz2EvhrWyKKbR

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks