General

  • Target

    E24DC7E7E25ECB169241ADA30D463E744CEF7A4671D6A80040AC08BA01F0C35B

  • Size

    4.0MB

  • Sample

    220720-j6wmtseadq

  • MD5

    430e4cb53b76ca44a2e8e855d1ffb8ef

  • SHA1

    25b1a81ed00f39f048f5246130f7d8201ba1bdef

  • SHA256

    e24dc7e7e25ecb169241ada30d463e744cef7a4671d6a80040ac08ba01f0c35b

  • SHA512

    c36aa2dfc572241212f97f241e6d67e8ebb4381b223a9b0ede4c3bd826c882d203ade5c5b8c5aecf90e2bcde1955052db03b01a7a99d1543abda83658c161cb6

Malware Config

Targets

    • Target

      E24DC7E7E25ECB169241ADA30D463E744CEF7A4671D6A80040AC08BA01F0C35B

    • Size

      4.0MB

    • MD5

      430e4cb53b76ca44a2e8e855d1ffb8ef

    • SHA1

      25b1a81ed00f39f048f5246130f7d8201ba1bdef

    • SHA256

      e24dc7e7e25ecb169241ada30d463e744cef7a4671d6a80040ac08ba01f0c35b

    • SHA512

      c36aa2dfc572241212f97f241e6d67e8ebb4381b223a9b0ede4c3bd826c882d203ade5c5b8c5aecf90e2bcde1955052db03b01a7a99d1543abda83658c161cb6

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks