General

  • Target

    acbd6173a4cc040b91a810e060e06fcc

  • Size

    4.1MB

  • Sample

    220715-dkmj5sgab8

  • MD5

    acbd6173a4cc040b91a810e060e06fcc

  • SHA1

    6e2b476be8b361e8c1e5bb14efe5d3842b4d7ca3

  • SHA256

    41b141e122bd86a5c4279094916564759cc342ae3b95fffd80af4b9676aa61b7

  • SHA512

    68c0264ff75ce5e96c35acc566ade1f4e537350bd03fbe17ba6729f99d7e2f397feb6afb537d9b177ffb78ff29816c4c993322357e4d9df28227624e8ecf5bb2

Malware Config

Targets

    • Target

      acbd6173a4cc040b91a810e060e06fcc

    • Size

      4.1MB

    • MD5

      acbd6173a4cc040b91a810e060e06fcc

    • SHA1

      6e2b476be8b361e8c1e5bb14efe5d3842b4d7ca3

    • SHA256

      41b141e122bd86a5c4279094916564759cc342ae3b95fffd80af4b9676aa61b7

    • SHA512

      68c0264ff75ce5e96c35acc566ade1f4e537350bd03fbe17ba6729f99d7e2f397feb6afb537d9b177ffb78ff29816c4c993322357e4d9df28227624e8ecf5bb2

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks