General

  • Target

    6c21057b47f4b84990aae1a7039621fc3c0bdebdbe3ea2685b6d1f15134cb068

  • Size

    4.0MB

  • Sample

    220915-d2vbbabhb7

  • MD5

    5b07b328013bb904ffbd6aff6032ec74

  • SHA1

    347bd61eb0fd12bee4990e234b848a4a936a72b8

  • SHA256

    6c21057b47f4b84990aae1a7039621fc3c0bdebdbe3ea2685b6d1f15134cb068

  • SHA512

    55e15259da0a06d311821a7cc88079bdc6ac23567e42c4348509846faa56e29b812845ddac7124b29db45409856d7f132a8ed0ec7b2cccf1f4f846c1e37dfe23

  • SSDEEP

    98304:BfkY0ONsPXKTHnFsTeZ+6N5mYiMuG5nSvBZPBE6MyfbFNBuVG:mQUACTeTwYpnG7BE6FFNBu

Malware Config

Targets

    • Target

      6c21057b47f4b84990aae1a7039621fc3c0bdebdbe3ea2685b6d1f15134cb068

    • Size

      4.0MB

    • MD5

      5b07b328013bb904ffbd6aff6032ec74

    • SHA1

      347bd61eb0fd12bee4990e234b848a4a936a72b8

    • SHA256

      6c21057b47f4b84990aae1a7039621fc3c0bdebdbe3ea2685b6d1f15134cb068

    • SHA512

      55e15259da0a06d311821a7cc88079bdc6ac23567e42c4348509846faa56e29b812845ddac7124b29db45409856d7f132a8ed0ec7b2cccf1f4f846c1e37dfe23

    • SSDEEP

      98304:BfkY0ONsPXKTHnFsTeZ+6N5mYiMuG5nSvBZPBE6MyfbFNBuVG:mQUACTeTwYpnG7BE6FFNBu

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks