General

  • Target

    06EA26ACEF022408EB717E18C775A17DDFC25A8F395377464227210D574BF731

  • Size

    4.0MB

  • Sample

    220720-h7zkfadefn

  • MD5

    cf9dfa38b013480328f9552f8b9dafdf

  • SHA1

    673611eed7cc0668f06817e3ff112cef36d3056f

  • SHA256

    06ea26acef022408eb717e18c775a17ddfc25a8f395377464227210d574bf731

  • SHA512

    cba35d7d1c9532a218d715e76948745845ebe58c84af6516043188b579c244de36585d3d8c32d4ef6618e75bab35efdef4c0d43620dca04b1a8a669c16ae646d

Malware Config

Targets

    • Target

      06EA26ACEF022408EB717E18C775A17DDFC25A8F395377464227210D574BF731

    • Size

      4.0MB

    • MD5

      cf9dfa38b013480328f9552f8b9dafdf

    • SHA1

      673611eed7cc0668f06817e3ff112cef36d3056f

    • SHA256

      06ea26acef022408eb717e18c775a17ddfc25a8f395377464227210d574bf731

    • SHA512

      cba35d7d1c9532a218d715e76948745845ebe58c84af6516043188b579c244de36585d3d8c32d4ef6618e75bab35efdef4c0d43620dca04b1a8a669c16ae646d

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks