General

  • Target

    CDB870D70E759D8E517605735ACE7F369F1E6DD34D97C24D1C5126712ABE417B

  • Size

    4.0MB

  • Sample

    220720-j3rjpseaan

  • MD5

    fd5e87b78fe103afc5a36d7001e3b3cc

  • SHA1

    172eaa9630c6adc93af26f4a5408bd71048a440a

  • SHA256

    cdb870d70e759d8e517605735ace7f369f1e6dd34d97c24d1c5126712abe417b

  • SHA512

    83dd4de45e9dd3231ad44904ea8c9cfa61c467b36ab40ed5542c1b7b3d73c837653d195e32860d4ef3b8fa1aa4089c06cb3e435415061e724fcaaecc2d4dae8c

Malware Config

Targets

    • Target

      CDB870D70E759D8E517605735ACE7F369F1E6DD34D97C24D1C5126712ABE417B

    • Size

      4.0MB

    • MD5

      fd5e87b78fe103afc5a36d7001e3b3cc

    • SHA1

      172eaa9630c6adc93af26f4a5408bd71048a440a

    • SHA256

      cdb870d70e759d8e517605735ace7f369f1e6dd34d97c24d1c5126712abe417b

    • SHA512

      83dd4de45e9dd3231ad44904ea8c9cfa61c467b36ab40ed5542c1b7b3d73c837653d195e32860d4ef3b8fa1aa4089c06cb3e435415061e724fcaaecc2d4dae8c

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks