General

  • Target

    339022094a1725ae16b8a0571fa0ec432194af1331c69394254c71e942719297

  • Size

    4.0MB

  • Sample

    220712-clpkfshfe6

  • MD5

    6ce4ae01149b9e7a5a18bd7d017cf972

  • SHA1

    c825fb4d24ef6f3b05a9d0d4df6e1cb513b56f27

  • SHA256

    339022094a1725ae16b8a0571fa0ec432194af1331c69394254c71e942719297

  • SHA512

    0b24c6a535772a11bfb5fa2c93542a5de480983493ab0ecb590acfd85913be835090268eb2738d7912043e335508406afe1bf33d29138e0230279c00904fdbc2

Malware Config

Targets

    • Target

      339022094a1725ae16b8a0571fa0ec432194af1331c69394254c71e942719297

    • Size

      4.0MB

    • MD5

      6ce4ae01149b9e7a5a18bd7d017cf972

    • SHA1

      c825fb4d24ef6f3b05a9d0d4df6e1cb513b56f27

    • SHA256

      339022094a1725ae16b8a0571fa0ec432194af1331c69394254c71e942719297

    • SHA512

      0b24c6a535772a11bfb5fa2c93542a5de480983493ab0ecb590acfd85913be835090268eb2738d7912043e335508406afe1bf33d29138e0230279c00904fdbc2

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks