General

  • Target

    13e3a662dca14bc7962cf41c51224bead8722a58000b4b0e2f6e65d420e02d03

  • Size

    4.0MB

  • Sample

    220915-dxcwgafedq

  • MD5

    956a88fae33446099370f3d0f4fb32fc

  • SHA1

    a4b17747852605693c5e8589421debda67b3af7b

  • SHA256

    13e3a662dca14bc7962cf41c51224bead8722a58000b4b0e2f6e65d420e02d03

  • SHA512

    753f8d6ade5e33faa761bc78c1b764bb951e51a41b15a1644615fc3910628ff25b19305a5a86b993aacd860d079278bb3c51a28b44aa1a1a7950c26194c11755

  • SSDEEP

    98304:GS/b382lN71hxh3XikxD81cgqGFJo8ntsgy2k7+QN87eLR7ViC:t/L82l1nH3Xi06lqGFJBGgm87eLDi

Malware Config

Targets

    • Target

      13e3a662dca14bc7962cf41c51224bead8722a58000b4b0e2f6e65d420e02d03

    • Size

      4.0MB

    • MD5

      956a88fae33446099370f3d0f4fb32fc

    • SHA1

      a4b17747852605693c5e8589421debda67b3af7b

    • SHA256

      13e3a662dca14bc7962cf41c51224bead8722a58000b4b0e2f6e65d420e02d03

    • SHA512

      753f8d6ade5e33faa761bc78c1b764bb951e51a41b15a1644615fc3910628ff25b19305a5a86b993aacd860d079278bb3c51a28b44aa1a1a7950c26194c11755

    • SSDEEP

      98304:GS/b382lN71hxh3XikxD81cgqGFJo8ntsgy2k7+QN87eLR7ViC:t/L82l1nH3Xi06lqGFJBGgm87eLDi

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks