General

  • Target

    610811d7f38b4e44d47c9ce6db1e66bb85dd658b2ab04bcd30fdeb7ad63c5f37

  • Size

    4.0MB

  • Sample

    220915-d2fg6abhb6

  • MD5

    995ddbcb472a2f29283e06c29221c291

  • SHA1

    466ee479e336157b1014a6b06633f34ab45ced54

  • SHA256

    610811d7f38b4e44d47c9ce6db1e66bb85dd658b2ab04bcd30fdeb7ad63c5f37

  • SHA512

    27c88bbc50b90cd818c83344a9cac0352e2efe1265de10cbf25a91c7745fcdf3df9cb07170dc48bb8cbcd11e4f56a57d369280efab0357cd27ae4767e19c4165

  • SSDEEP

    98304:FgdOnZ7OJYwgORpc5dANc19QrBuO0ij7XWmJ85w6:Fgd+lOJXSdb19QVnXWK6

Malware Config

Targets

    • Target

      610811d7f38b4e44d47c9ce6db1e66bb85dd658b2ab04bcd30fdeb7ad63c5f37

    • Size

      4.0MB

    • MD5

      995ddbcb472a2f29283e06c29221c291

    • SHA1

      466ee479e336157b1014a6b06633f34ab45ced54

    • SHA256

      610811d7f38b4e44d47c9ce6db1e66bb85dd658b2ab04bcd30fdeb7ad63c5f37

    • SHA512

      27c88bbc50b90cd818c83344a9cac0352e2efe1265de10cbf25a91c7745fcdf3df9cb07170dc48bb8cbcd11e4f56a57d369280efab0357cd27ae4767e19c4165

    • SSDEEP

      98304:FgdOnZ7OJYwgORpc5dANc19QrBuO0ij7XWmJ85w6:Fgd+lOJXSdb19QVnXWK6

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks