General

  • Target

    E96C5609FAA3507EBD8CEDC9B50B03C2E41C322A31BDFFC340BB7CD1473A673C

  • Size

    4.0MB

  • Sample

    220720-j7hscseaer

  • MD5

    367e0e11054b6db2b2bbe42e80f564d0

  • SHA1

    532bc56073ad1103b4acdc4c89ccf40b4a80a3c8

  • SHA256

    e96c5609faa3507ebd8cedc9b50b03c2e41c322a31bdffc340bb7cd1473a673c

  • SHA512

    f93b62359ff4b78a3bc5315a4da236d3e5efe85b3dad9f4415844e3e803d93760f4655a70027bba6b9a886807757339a524d2db395d128ac52716b8514f93274

Malware Config

Targets

    • Target

      E96C5609FAA3507EBD8CEDC9B50B03C2E41C322A31BDFFC340BB7CD1473A673C

    • Size

      4.0MB

    • MD5

      367e0e11054b6db2b2bbe42e80f564d0

    • SHA1

      532bc56073ad1103b4acdc4c89ccf40b4a80a3c8

    • SHA256

      e96c5609faa3507ebd8cedc9b50b03c2e41c322a31bdffc340bb7cd1473a673c

    • SHA512

      f93b62359ff4b78a3bc5315a4da236d3e5efe85b3dad9f4415844e3e803d93760f4655a70027bba6b9a886807757339a524d2db395d128ac52716b8514f93274

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks