General

  • Target

    CB2E076D17BE99E861FD63554B26EEE3F715997627C09BF4A9CA7EF78056BDA5

  • Size

    4.0MB

  • Sample

    220720-j28rlaeaal

  • MD5

    1e2b548efc0c6c99718661712932c789

  • SHA1

    4d9a106abd6e5192fa283da6b713b36ed07f170b

  • SHA256

    cb2e076d17be99e861fd63554b26eee3f715997627c09bf4a9ca7ef78056bda5

  • SHA512

    f2ad8c522075495059a651d8029da5e02da1070302b5e559a8330b9c244f704c7cce7c95485e0109f548aa8f67c59471db55cb0f560b8409e2331487c4e1fc07

Malware Config

Targets

    • Target

      CB2E076D17BE99E861FD63554B26EEE3F715997627C09BF4A9CA7EF78056BDA5

    • Size

      4.0MB

    • MD5

      1e2b548efc0c6c99718661712932c789

    • SHA1

      4d9a106abd6e5192fa283da6b713b36ed07f170b

    • SHA256

      cb2e076d17be99e861fd63554b26eee3f715997627c09bf4a9ca7ef78056bda5

    • SHA512

      f2ad8c522075495059a651d8029da5e02da1070302b5e559a8330b9c244f704c7cce7c95485e0109f548aa8f67c59471db55cb0f560b8409e2331487c4e1fc07

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks