General

  • Target

    01DB7CE4B8FB5C6DDB284193F106513CFDBF0C5E3C02ABDFC56885327E52A3AA

  • Size

    4.0MB

  • Sample

    220720-h63kpsdaf7

  • MD5

    89ff051e68bcc666e371840aaf1c1dde

  • SHA1

    9c801f81ac5d25695f53bac50aed08032bac9ab5

  • SHA256

    01db7ce4b8fb5c6ddb284193f106513cfdbf0c5e3c02abdfc56885327e52a3aa

  • SHA512

    e890601497267df292b7309d7c504ef9ba969756813ba498edcefe7b1cc2b3e58f20f5c079941571f1b9030282ad6a050ef35a14489e0f7f90a3b6ad46307b4a

Malware Config

Targets

    • Target

      01DB7CE4B8FB5C6DDB284193F106513CFDBF0C5E3C02ABDFC56885327E52A3AA

    • Size

      4.0MB

    • MD5

      89ff051e68bcc666e371840aaf1c1dde

    • SHA1

      9c801f81ac5d25695f53bac50aed08032bac9ab5

    • SHA256

      01db7ce4b8fb5c6ddb284193f106513cfdbf0c5e3c02abdfc56885327e52a3aa

    • SHA512

      e890601497267df292b7309d7c504ef9ba969756813ba498edcefe7b1cc2b3e58f20f5c079941571f1b9030282ad6a050ef35a14489e0f7f90a3b6ad46307b4a

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks