General

  • Target

    3cd0cfe1fc94267d3abfd828eef75f167570f3aef6b79ff20595cc965a3ad1eb

  • Size

    4.0MB

  • Sample

    220915-dz2ydafefl

  • MD5

    5ab27ffc06ac4caa6b4467d9b8e1bb5c

  • SHA1

    8dff39ffe90914894a41b22df544d94536c10267

  • SHA256

    3cd0cfe1fc94267d3abfd828eef75f167570f3aef6b79ff20595cc965a3ad1eb

  • SHA512

    3944116ce24ace12def4a869e5ec3f48b88036ee4147404fb78ad80d36938796b4e2659f56ebb8ae2f1a12f18e63f0c52d6b1d40198a809f16d666f0ded16807

  • SSDEEP

    98304:3YnwokpuNSTuqmI79vyES8K4KE8RtPTz9/Xv4p2P80BrZpR/hZ:CepjTBmW95gD9IYBtpR/hZ

Malware Config

Targets

    • Target

      3cd0cfe1fc94267d3abfd828eef75f167570f3aef6b79ff20595cc965a3ad1eb

    • Size

      4.0MB

    • MD5

      5ab27ffc06ac4caa6b4467d9b8e1bb5c

    • SHA1

      8dff39ffe90914894a41b22df544d94536c10267

    • SHA256

      3cd0cfe1fc94267d3abfd828eef75f167570f3aef6b79ff20595cc965a3ad1eb

    • SHA512

      3944116ce24ace12def4a869e5ec3f48b88036ee4147404fb78ad80d36938796b4e2659f56ebb8ae2f1a12f18e63f0c52d6b1d40198a809f16d666f0ded16807

    • SSDEEP

      98304:3YnwokpuNSTuqmI79vyES8K4KE8RtPTz9/Xv4p2P80BrZpR/hZ:CepjTBmW95gD9IYBtpR/hZ

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks