General

  • Target

    EA50C625D8C9A7CB3B771C4320C122C86A2FC2A59552C88EAC44FB56F84F9EE0

  • Size

    4.0MB

  • Sample

    220720-j7vrxseafk

  • MD5

    50a5c8876a7aa8f179ce2a6e9275ab26

  • SHA1

    b09cd1faac3c23468d10cc9952c34f4615bace8d

  • SHA256

    ea50c625d8c9a7cb3b771c4320c122c86a2fc2a59552c88eac44fb56f84f9ee0

  • SHA512

    0b72c1f12637d4a84d891fa7f70c228385e7e6fa14a85081c3c45006b1c1625bb6067b021187fc16d08981949c36da7e648743da5b3950a92e27c1347e63633c

Malware Config

Targets

    • Target

      EA50C625D8C9A7CB3B771C4320C122C86A2FC2A59552C88EAC44FB56F84F9EE0

    • Size

      4.0MB

    • MD5

      50a5c8876a7aa8f179ce2a6e9275ab26

    • SHA1

      b09cd1faac3c23468d10cc9952c34f4615bace8d

    • SHA256

      ea50c625d8c9a7cb3b771c4320c122c86a2fc2a59552c88eac44fb56f84f9ee0

    • SHA512

      0b72c1f12637d4a84d891fa7f70c228385e7e6fa14a85081c3c45006b1c1625bb6067b021187fc16d08981949c36da7e648743da5b3950a92e27c1347e63633c

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks