General

  • Target

    EFD2F077A353EAA4B72CA2BC038464A32C82CD84717D8D8FA50FDB77B9A4D736

  • Size

    4.0MB

  • Sample

    220720-j88p6seagk

  • MD5

    0fe145975973cea3a7c3aa5be08e721d

  • SHA1

    d9dab19a64bc01fd1147531f11e9440731745af0

  • SHA256

    efd2f077a353eaa4b72ca2bc038464a32c82cd84717d8d8fa50fdb77b9a4d736

  • SHA512

    4c2f3a26383351df9d79726aa9230a96bb5c7d89f9dc18475e002e8fab5bd02d99d8cbceeba51a41c87003c5c6ac1e8ee692abae55754cb4558e4b6035cfc690

Malware Config

Targets

    • Target

      EFD2F077A353EAA4B72CA2BC038464A32C82CD84717D8D8FA50FDB77B9A4D736

    • Size

      4.0MB

    • MD5

      0fe145975973cea3a7c3aa5be08e721d

    • SHA1

      d9dab19a64bc01fd1147531f11e9440731745af0

    • SHA256

      efd2f077a353eaa4b72ca2bc038464a32c82cd84717d8d8fa50fdb77b9a4d736

    • SHA512

      4c2f3a26383351df9d79726aa9230a96bb5c7d89f9dc18475e002e8fab5bd02d99d8cbceeba51a41c87003c5c6ac1e8ee692abae55754cb4558e4b6035cfc690

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks