General

  • Target

    C62FCB7F10018EDDDE51955C0B3A3B56D480436DA9FCDCC74A1FFAEDE802D671

  • Size

    4.0MB

  • Sample

    220720-j1w2eadea2

  • MD5

    675c220f1aefdb1abbfdbfc281dc91a4

  • SHA1

    baea439d03f9860f7e0f229468cf58bb8f7b4b5a

  • SHA256

    c62fcb7f10018eddde51955c0b3a3b56d480436da9fcdcc74a1ffaede802d671

  • SHA512

    71966ed8cee38bded1c3200f012c7353699b3dea16d76d9fb3a354185dc44abdeb108c4271eba56b2ace1e6abac29ab351330d2dd67befd11f34699b7f2141a6

Malware Config

Targets

    • Target

      C62FCB7F10018EDDDE51955C0B3A3B56D480436DA9FCDCC74A1FFAEDE802D671

    • Size

      4.0MB

    • MD5

      675c220f1aefdb1abbfdbfc281dc91a4

    • SHA1

      baea439d03f9860f7e0f229468cf58bb8f7b4b5a

    • SHA256

      c62fcb7f10018eddde51955c0b3a3b56d480436da9fcdcc74a1ffaede802d671

    • SHA512

      71966ed8cee38bded1c3200f012c7353699b3dea16d76d9fb3a354185dc44abdeb108c4271eba56b2ace1e6abac29ab351330d2dd67befd11f34699b7f2141a6

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks