General

  • Target

    09D9F55CEFA3DFF5EF3FF5EC3CA7500DB225FD6E56BFE278BA6907C16B6C79CB

  • Size

    4.0MB

  • Sample

    220720-h8ftqadegk

  • MD5

    7bfa990e3d835cd08e29168d6184cd6c

  • SHA1

    a37e6a762885a86bcd5d56ed5aca2dab021fde60

  • SHA256

    09d9f55cefa3dff5ef3ff5ec3ca7500db225fd6e56bfe278ba6907c16b6c79cb

  • SHA512

    206bdcc26c95ca0407c3c922db45ccccda9630126e45b36f1a9ae5a3dece793f18e7fd1279c0f4f097791cfdace74ac75aef937381b229c050ee3841834772a0

Malware Config

Targets

    • Target

      09D9F55CEFA3DFF5EF3FF5EC3CA7500DB225FD6E56BFE278BA6907C16B6C79CB

    • Size

      4.0MB

    • MD5

      7bfa990e3d835cd08e29168d6184cd6c

    • SHA1

      a37e6a762885a86bcd5d56ed5aca2dab021fde60

    • SHA256

      09d9f55cefa3dff5ef3ff5ec3ca7500db225fd6e56bfe278ba6907c16b6c79cb

    • SHA512

      206bdcc26c95ca0407c3c922db45ccccda9630126e45b36f1a9ae5a3dece793f18e7fd1279c0f4f097791cfdace74ac75aef937381b229c050ee3841834772a0

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks