General

  • Target

    C6633FC934B174A8A417681FEC199C58554B2ED9E2CBCF7706DD4C4C8F7BAA19

  • Size

    4.0MB

  • Sample

    220720-j15njsdhhj

  • MD5

    7842bde35906a1a218a85bdbefb2e3f4

  • SHA1

    c52813dea20dc958cd4a56dc4c3a16c5718362dc

  • SHA256

    c6633fc934b174a8a417681fec199c58554b2ed9e2cbcf7706dd4c4c8f7baa19

  • SHA512

    546ae33f49323fa418cba7b46edfb4944abfd0b90d08d9c4943cd2df89497f3d6dbaaf26f4d6d06fcdb56e14f7dd7c399a6b47eac37d9afb7dbd4467f7bf854d

Malware Config

Targets

    • Target

      C6633FC934B174A8A417681FEC199C58554B2ED9E2CBCF7706DD4C4C8F7BAA19

    • Size

      4.0MB

    • MD5

      7842bde35906a1a218a85bdbefb2e3f4

    • SHA1

      c52813dea20dc958cd4a56dc4c3a16c5718362dc

    • SHA256

      c6633fc934b174a8a417681fec199c58554b2ed9e2cbcf7706dd4c4c8f7baa19

    • SHA512

      546ae33f49323fa418cba7b46edfb4944abfd0b90d08d9c4943cd2df89497f3d6dbaaf26f4d6d06fcdb56e14f7dd7c399a6b47eac37d9afb7dbd4467f7bf854d

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks