General

  • Target

    D97841D8F4D129FDD2C57C8F9BA1721117C821A8002BE2174A4B8843879A1A2B

  • Size

    4.0MB

  • Sample

    220720-j5mcrseacq

  • MD5

    9501c4983d063c52071cb9ddb2e99912

  • SHA1

    1d0f67662bf0bcac6cd75f7132ac810dff828c6b

  • SHA256

    d97841d8f4d129fdd2c57c8f9ba1721117c821a8002be2174a4b8843879a1a2b

  • SHA512

    dc02561bad6dded1e006f06b7ffca3fff3eba7cbfdf84da5805807a1f8c829e6a385e6a6ddb909e15de1eb84b5a30d270622d48b579326f118fc384e0b338a55

Malware Config

Targets

    • Target

      D97841D8F4D129FDD2C57C8F9BA1721117C821A8002BE2174A4B8843879A1A2B

    • Size

      4.0MB

    • MD5

      9501c4983d063c52071cb9ddb2e99912

    • SHA1

      1d0f67662bf0bcac6cd75f7132ac810dff828c6b

    • SHA256

      d97841d8f4d129fdd2c57c8f9ba1721117c821a8002be2174a4b8843879a1a2b

    • SHA512

      dc02561bad6dded1e006f06b7ffca3fff3eba7cbfdf84da5805807a1f8c829e6a385e6a6ddb909e15de1eb84b5a30d270622d48b579326f118fc384e0b338a55

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks