General

  • Target

    D779813711126484668391068C6845DB71E7983D5B4C01A192D1208C8777E14F

  • Size

    4.0MB

  • Sample

    220720-j5kh6sdec2

  • MD5

    407d43e4d1bd53450b265e75cac1c7ee

  • SHA1

    67057def6a4cc0f0ec5979c066ebd855af7dd7eb

  • SHA256

    d779813711126484668391068c6845db71e7983d5b4c01a192d1208c8777e14f

  • SHA512

    22e43c38130fbb5f9b312f89d060bb763fa3dbf538019123c407e9fccabb6f00df354956a67a6bac486d0b4db453e8b656162d93e620034c32b28737e8355142

Malware Config

Targets

    • Target

      D779813711126484668391068C6845DB71E7983D5B4C01A192D1208C8777E14F

    • Size

      4.0MB

    • MD5

      407d43e4d1bd53450b265e75cac1c7ee

    • SHA1

      67057def6a4cc0f0ec5979c066ebd855af7dd7eb

    • SHA256

      d779813711126484668391068c6845db71e7983d5b4c01a192d1208c8777e14f

    • SHA512

      22e43c38130fbb5f9b312f89d060bb763fa3dbf538019123c407e9fccabb6f00df354956a67a6bac486d0b4db453e8b656162d93e620034c32b28737e8355142

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks