General

  • Target

    a7a0af99f5b4ed92f74abdd2b8faffd270a821dce3ab8ec164d6d17dd46d2be0

  • Size

    4.0MB

  • Sample

    220915-d3y1wsfegk

  • MD5

    657879c2babd84a404ce7429cc867ce1

  • SHA1

    0e22e3303cf80847335257647467149cafd84f72

  • SHA256

    a7a0af99f5b4ed92f74abdd2b8faffd270a821dce3ab8ec164d6d17dd46d2be0

  • SHA512

    e5bd207e533440a23dec2351cd24a4bcc52325cf9b101c15cec7f2d935450b740097640cdb0fc5191e10b40d4f6437a8b5e0e87361bc5c22eb19f4eae76fd8f0

  • SSDEEP

    98304:NL6zJsMASU6Mfm4bH2vf7emPW5U4S/4KDS3A1BqCW:16t/yHMzNua94K

Malware Config

Targets

    • Target

      a7a0af99f5b4ed92f74abdd2b8faffd270a821dce3ab8ec164d6d17dd46d2be0

    • Size

      4.0MB

    • MD5

      657879c2babd84a404ce7429cc867ce1

    • SHA1

      0e22e3303cf80847335257647467149cafd84f72

    • SHA256

      a7a0af99f5b4ed92f74abdd2b8faffd270a821dce3ab8ec164d6d17dd46d2be0

    • SHA512

      e5bd207e533440a23dec2351cd24a4bcc52325cf9b101c15cec7f2d935450b740097640cdb0fc5191e10b40d4f6437a8b5e0e87361bc5c22eb19f4eae76fd8f0

    • SSDEEP

      98304:NL6zJsMASU6Mfm4bH2vf7emPW5U4S/4KDS3A1BqCW:16t/yHMzNua94K

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks