General

  • Target

    30e5d30cfc17f5c85ff99abce4c5c3e3b026fd01ddfaef8dc8dfb02b9c9d8384

  • Size

    4.0MB

  • Sample

    220915-dzjf2abha8

  • MD5

    c5ca08bcb25c45ea0f92839b22e37b15

  • SHA1

    4202c1332aae996f4efa560315dd75588d425e2e

  • SHA256

    30e5d30cfc17f5c85ff99abce4c5c3e3b026fd01ddfaef8dc8dfb02b9c9d8384

  • SHA512

    081d63dfdab6f45fb91a4851ee81ed55f0368d50c5b1879864d55cc3239c7fa8afe11f10fc5932ebe25b8c19c6d385c03806a93129264c8a193df0f41d97d654

  • SSDEEP

    98304:Oj3R/ePCvhtmAuXSzxxm6v5rzRPwfIzIx4l2YPmZjV1:OrRDrRgSVc6Br9II8x4QkmH1

Malware Config

Targets

    • Target

      30e5d30cfc17f5c85ff99abce4c5c3e3b026fd01ddfaef8dc8dfb02b9c9d8384

    • Size

      4.0MB

    • MD5

      c5ca08bcb25c45ea0f92839b22e37b15

    • SHA1

      4202c1332aae996f4efa560315dd75588d425e2e

    • SHA256

      30e5d30cfc17f5c85ff99abce4c5c3e3b026fd01ddfaef8dc8dfb02b9c9d8384

    • SHA512

      081d63dfdab6f45fb91a4851ee81ed55f0368d50c5b1879864d55cc3239c7fa8afe11f10fc5932ebe25b8c19c6d385c03806a93129264c8a193df0f41d97d654

    • SSDEEP

      98304:Oj3R/ePCvhtmAuXSzxxm6v5rzRPwfIzIx4l2YPmZjV1:OrRDrRgSVc6Br9II8x4QkmH1

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks