General

  • Target

    97a20e483ae9a8910fb9c71b89fd2245c32dca6cb140ff4924396749e871d6ed

  • Size

    4.3MB

  • Sample

    220905-nqa4eaagh3

  • MD5

    4462c84266c4ebda3a424e5716966c5d

  • SHA1

    6eadce32021d4458c0c9aa1ed495386341cc8300

  • SHA256

    97a20e483ae9a8910fb9c71b89fd2245c32dca6cb140ff4924396749e871d6ed

  • SHA512

    aa9d40f1c2fd04f25422b8834ae68ac33a99fb412603dc0859adbfbe848f6d58278435062413ab650d63cddc6a722ce9d3ced846127174f5af64433f8133f384

  • SSDEEP

    98304:u0CcBwzdfo032ZiBW3f9yl7GdiwkZ9SYDA5AhXhxqQPU5Tmn:uywJ1Faf9iKs1bSYDq6hwwYKn

Malware Config

Targets

    • Target

      97a20e483ae9a8910fb9c71b89fd2245c32dca6cb140ff4924396749e871d6ed

    • Size

      4.3MB

    • MD5

      4462c84266c4ebda3a424e5716966c5d

    • SHA1

      6eadce32021d4458c0c9aa1ed495386341cc8300

    • SHA256

      97a20e483ae9a8910fb9c71b89fd2245c32dca6cb140ff4924396749e871d6ed

    • SHA512

      aa9d40f1c2fd04f25422b8834ae68ac33a99fb412603dc0859adbfbe848f6d58278435062413ab650d63cddc6a722ce9d3ced846127174f5af64433f8133f384

    • SSDEEP

      98304:u0CcBwzdfo032ZiBW3f9yl7GdiwkZ9SYDA5AhXhxqQPU5Tmn:uywJ1Faf9iKs1bSYDq6hwwYKn

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks