General

  • Target

    E31E725909B115601EFEA63FDECD2CA3C283657CB752FB7C9C46B19FFB23BED9

  • Size

    4.0MB

  • Sample

    220720-j69jpaeaej

  • MD5

    8ce9e5d7d30ab124b69bc3ff0c1d9d4c

  • SHA1

    65aa51dc471515d16e4350fc0fbd8b302f468ec0

  • SHA256

    e31e725909b115601efea63fdecd2ca3c283657cb752fb7c9c46b19ffb23bed9

  • SHA512

    724757de3f0f4228c373cbff27f6375998a988ea7d2f5bbec89504f5e438a3e9ee621a2cb229122d8e2934b4d0910a5317d7e09d890a3aeb0724c54655910f27

Malware Config

Targets

    • Target

      E31E725909B115601EFEA63FDECD2CA3C283657CB752FB7C9C46B19FFB23BED9

    • Size

      4.0MB

    • MD5

      8ce9e5d7d30ab124b69bc3ff0c1d9d4c

    • SHA1

      65aa51dc471515d16e4350fc0fbd8b302f468ec0

    • SHA256

      e31e725909b115601efea63fdecd2ca3c283657cb752fb7c9c46b19ffb23bed9

    • SHA512

      724757de3f0f4228c373cbff27f6375998a988ea7d2f5bbec89504f5e438a3e9ee621a2cb229122d8e2934b4d0910a5317d7e09d890a3aeb0724c54655910f27

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks