General

  • Target

    719a9a17c53a7eff99714ab010582f6fabbb87fa322148fa6ba35dd10a8bfb2a

  • Size

    4.0MB

  • Sample

    220915-d24vrabhb8

  • MD5

    ceb82ee9c3f7d44a6ea4d9d5f13eeafb

  • SHA1

    21cfb9421f8b6c28bf6c6c0f4795eb69fe8671c0

  • SHA256

    719a9a17c53a7eff99714ab010582f6fabbb87fa322148fa6ba35dd10a8bfb2a

  • SHA512

    bf0a6a855140e46ca3b9e063c045935bea7f759c041a0f10631cc17c5544b30312657c9ac5c51a3368f8d56105b8dbceb6789599629ea47d6d5fcc48ef03e71c

  • SSDEEP

    98304:UnjEWH08cS19gMSx//jDar2VhRAOw811/Ouc1kU2yxQNi:mPUlS9TIDD82Vvl11I1TpxJ

Malware Config

Targets

    • Target

      719a9a17c53a7eff99714ab010582f6fabbb87fa322148fa6ba35dd10a8bfb2a

    • Size

      4.0MB

    • MD5

      ceb82ee9c3f7d44a6ea4d9d5f13eeafb

    • SHA1

      21cfb9421f8b6c28bf6c6c0f4795eb69fe8671c0

    • SHA256

      719a9a17c53a7eff99714ab010582f6fabbb87fa322148fa6ba35dd10a8bfb2a

    • SHA512

      bf0a6a855140e46ca3b9e063c045935bea7f759c041a0f10631cc17c5544b30312657c9ac5c51a3368f8d56105b8dbceb6789599629ea47d6d5fcc48ef03e71c

    • SSDEEP

      98304:UnjEWH08cS19gMSx//jDar2VhRAOw811/Ouc1kU2yxQNi:mPUlS9TIDD82Vvl11I1TpxJ

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks