General

  • Target

    1f8e32633f1f438d64e2c74e0b3867d2bdbca53d1aa2ab01735f9c6eec2ff3c0

  • Size

    4.0MB

  • Sample

    220712-cj1vpshfc7

  • MD5

    a376e47a9a7a36ad3d6c3f0bcfac8b7c

  • SHA1

    e68b5e93ecffa94af12750f00ab801940c841137

  • SHA256

    1f8e32633f1f438d64e2c74e0b3867d2bdbca53d1aa2ab01735f9c6eec2ff3c0

  • SHA512

    835fa61bdb643e73c57e44a0bfbe7501a5734c2dd1b0afbcf7a54898b08c7007b9d0ad1cca280552aecd344e0da69461db136ad9afb3d7d3063ebd0dd977c359

Malware Config

Targets

    • Target

      1f8e32633f1f438d64e2c74e0b3867d2bdbca53d1aa2ab01735f9c6eec2ff3c0

    • Size

      4.0MB

    • MD5

      a376e47a9a7a36ad3d6c3f0bcfac8b7c

    • SHA1

      e68b5e93ecffa94af12750f00ab801940c841137

    • SHA256

      1f8e32633f1f438d64e2c74e0b3867d2bdbca53d1aa2ab01735f9c6eec2ff3c0

    • SHA512

      835fa61bdb643e73c57e44a0bfbe7501a5734c2dd1b0afbcf7a54898b08c7007b9d0ad1cca280552aecd344e0da69461db136ad9afb3d7d3063ebd0dd977c359

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks