General

  • Target

    0616327B78A4E43721FED180BB0F6D42D861028A0A3FED91389AE313D143EB18

  • Size

    4.0MB

  • Sample

    220720-h7kraadefk

  • MD5

    a15703362f04e471d01a129b10fea654

  • SHA1

    bc534cbcedd8d5db6b5d7daaeb776972befad633

  • SHA256

    0616327b78a4e43721fed180bb0f6d42d861028a0a3fed91389ae313d143eb18

  • SHA512

    e97b41d54dc92cfda378267ca982a14a76eae4d0e5f1f22713e48c3f0d26be80bf9e8a01de9154d39aaec45405c35117f536a9be0b432faedd0b212b67ff7bab

Malware Config

Targets

    • Target

      0616327B78A4E43721FED180BB0F6D42D861028A0A3FED91389AE313D143EB18

    • Size

      4.0MB

    • MD5

      a15703362f04e471d01a129b10fea654

    • SHA1

      bc534cbcedd8d5db6b5d7daaeb776972befad633

    • SHA256

      0616327b78a4e43721fed180bb0f6d42d861028a0a3fed91389ae313d143eb18

    • SHA512

      e97b41d54dc92cfda378267ca982a14a76eae4d0e5f1f22713e48c3f0d26be80bf9e8a01de9154d39aaec45405c35117f536a9be0b432faedd0b212b67ff7bab

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks