General

  • Target

    30b27481f8000aa358881a5d0a60f5eee60ece9ef73765db686e8f3e6a37367e

  • Size

    4.0MB

  • Sample

    220915-dzgbnsbha7

  • MD5

    9e6c8bc80a0453eb61a1525a5d5256c7

  • SHA1

    9e462edc0a9b07d5096fc58a245e4c5430e9212d

  • SHA256

    30b27481f8000aa358881a5d0a60f5eee60ece9ef73765db686e8f3e6a37367e

  • SHA512

    0094607be9c15aeb5ce325a09825266cc0a542d44d430a8be66e628bcc6a3e19bc4edcb61ce53f14a946015da633778e96c17925b281d3b8edf6aa7cc300e86d

  • SSDEEP

    98304:SxflX0KdTxd4THKt2TCXqY/d4iSBYhxH/P15uGUIxMX:qNN4THAIC6Y/iBYnnu7I2

Malware Config

Targets

    • Target

      30b27481f8000aa358881a5d0a60f5eee60ece9ef73765db686e8f3e6a37367e

    • Size

      4.0MB

    • MD5

      9e6c8bc80a0453eb61a1525a5d5256c7

    • SHA1

      9e462edc0a9b07d5096fc58a245e4c5430e9212d

    • SHA256

      30b27481f8000aa358881a5d0a60f5eee60ece9ef73765db686e8f3e6a37367e

    • SHA512

      0094607be9c15aeb5ce325a09825266cc0a542d44d430a8be66e628bcc6a3e19bc4edcb61ce53f14a946015da633778e96c17925b281d3b8edf6aa7cc300e86d

    • SSDEEP

      98304:SxflX0KdTxd4THKt2TCXqY/d4iSBYhxH/P15uGUIxMX:qNN4THAIC6Y/iBYnnu7I2

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks