General

  • Target

    EB069C5DFC4B00601B71FC9CF9DEEB1F129CB9F4C9396E4D31151E9F76227EE6

  • Size

    4.0MB

  • Sample

    220720-j71yyaeafl

  • MD5

    edd6fff3fc35f0ed6ef2dbd339da1146

  • SHA1

    f999fcb621a1c45260a6edea1adbaaf512fa2102

  • SHA256

    eb069c5dfc4b00601b71fc9cf9deeb1f129cb9f4c9396e4d31151e9f76227ee6

  • SHA512

    44ef6ec39b6dc64839381e4e8d5a8027229da308de2eb4afc1d37e9b7c6a3a87c89b9d4af36d08214f3c0ac75dd98bb595b785f9f5c0a8827fd19afcf70432b8

Malware Config

Targets

    • Target

      EB069C5DFC4B00601B71FC9CF9DEEB1F129CB9F4C9396E4D31151E9F76227EE6

    • Size

      4.0MB

    • MD5

      edd6fff3fc35f0ed6ef2dbd339da1146

    • SHA1

      f999fcb621a1c45260a6edea1adbaaf512fa2102

    • SHA256

      eb069c5dfc4b00601b71fc9cf9deeb1f129cb9f4c9396e4d31151e9f76227ee6

    • SHA512

      44ef6ec39b6dc64839381e4e8d5a8027229da308de2eb4afc1d37e9b7c6a3a87c89b9d4af36d08214f3c0ac75dd98bb595b785f9f5c0a8827fd19afcf70432b8

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks