General

  • Target

    CEB347EB751265CF60634B7D017FEEA6665A78AE17EC1E51DDECEE791662DD71

  • Size

    4.0MB

  • Sample

    220720-j3x2gsdea9

  • MD5

    23e195e5f5a1d168b084c5ba124dfb47

  • SHA1

    302ebac608b9ca82f2780f354e70c4628e325190

  • SHA256

    ceb347eb751265cf60634b7d017feea6665a78ae17ec1e51ddecee791662dd71

  • SHA512

    d5c46958033ccdf063abc354e5b6b513ea1520ed6bf1b0550d53854ddfc86d3954a2b0290284fc55acb412be4151ba72caf172677a9892d14999d633dacad6a3

Malware Config

Targets

    • Target

      CEB347EB751265CF60634B7D017FEEA6665A78AE17EC1E51DDECEE791662DD71

    • Size

      4.0MB

    • MD5

      23e195e5f5a1d168b084c5ba124dfb47

    • SHA1

      302ebac608b9ca82f2780f354e70c4628e325190

    • SHA256

      ceb347eb751265cf60634b7d017feea6665a78ae17ec1e51ddecee791662dd71

    • SHA512

      d5c46958033ccdf063abc354e5b6b513ea1520ed6bf1b0550d53854ddfc86d3954a2b0290284fc55acb412be4151ba72caf172677a9892d14999d633dacad6a3

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks