General

  • Target

    CFE2497BE113C4228D66927C1F36E9AB750B75DD6EBDAF34C331F33DE598686D

  • Size

    4.0MB

  • Sample

    220720-j4hm7aeabp

  • MD5

    509a39fe7f11ba7a5575b7eadb440e4b

  • SHA1

    12c711be40e2913ecd95a36b5aa392cc491696bd

  • SHA256

    cfe2497be113c4228d66927c1f36e9ab750b75dd6ebdaf34c331f33de598686d

  • SHA512

    f2de4c97bba1dbe41fc03aee6d7e99d8ad8d5371927f34f91254764af5885cc5f035626d5b3ced81ac259ddb8716f517254fe34d7dd667999a2cb2f6f8df448a

Malware Config

Targets

    • Target

      CFE2497BE113C4228D66927C1F36E9AB750B75DD6EBDAF34C331F33DE598686D

    • Size

      4.0MB

    • MD5

      509a39fe7f11ba7a5575b7eadb440e4b

    • SHA1

      12c711be40e2913ecd95a36b5aa392cc491696bd

    • SHA256

      cfe2497be113c4228d66927c1f36e9ab750b75dd6ebdaf34c331f33de598686d

    • SHA512

      f2de4c97bba1dbe41fc03aee6d7e99d8ad8d5371927f34f91254764af5885cc5f035626d5b3ced81ac259ddb8716f517254fe34d7dd667999a2cb2f6f8df448a

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks