General

  • Target

    f32e33a2aee1b833d1e1c57b759a72b5bfdb47a14ef69776dccf8147b7dff5c5

  • Size

    4.0MB

  • Sample

    220915-d56thsfehk

  • MD5

    396c6ce6b1e7497796c102421ee9d757

  • SHA1

    67b0d66287c2b4975c8338a0a48b4770bd92bd3d

  • SHA256

    f32e33a2aee1b833d1e1c57b759a72b5bfdb47a14ef69776dccf8147b7dff5c5

  • SHA512

    a3c1ef261ba3bcf6f6dec7e9fae05c977e903a19bb08cf6625475b232af785f08cb8f4c37dc6aefa6552311705ca6ea3e23dd99cc6850611d9fdcd84948ca5f3

  • SSDEEP

    98304:sxF0Ce5Gvf3uJ6R+sO8rQHHNVhpmLY0RLgOcyRF+:sxGCe5Gvf3BR+sOsQnuLYkLgLG

Malware Config

Targets

    • Target

      f32e33a2aee1b833d1e1c57b759a72b5bfdb47a14ef69776dccf8147b7dff5c5

    • Size

      4.0MB

    • MD5

      396c6ce6b1e7497796c102421ee9d757

    • SHA1

      67b0d66287c2b4975c8338a0a48b4770bd92bd3d

    • SHA256

      f32e33a2aee1b833d1e1c57b759a72b5bfdb47a14ef69776dccf8147b7dff5c5

    • SHA512

      a3c1ef261ba3bcf6f6dec7e9fae05c977e903a19bb08cf6625475b232af785f08cb8f4c37dc6aefa6552311705ca6ea3e23dd99cc6850611d9fdcd84948ca5f3

    • SSDEEP

      98304:sxF0Ce5Gvf3uJ6R+sO8rQHHNVhpmLY0RLgOcyRF+:sxGCe5Gvf3BR+sOsQnuLYkLgLG

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks