General

  • Target

    EC790BBBB3055B770F7B064F6AE6E50B82C181282976E76AE991C0E716D877E4

  • Size

    4.0MB

  • Sample

    220720-j8kncaeafr

  • MD5

    49b6deb76be860c4fad3e67f10336e98

  • SHA1

    96fad3c08bc9802f06aa0bee7a4961b9e4ddaa72

  • SHA256

    ec790bbbb3055b770f7b064f6ae6e50b82c181282976e76ae991c0e716d877e4

  • SHA512

    218b9e23858525ac91928f7551d87629866ae1377ea34ad642db19f408539debeb77107d327bffa8b1c84b09d6fcdd5bd236d0ff918f2a5e724c6ceba8c45481

Malware Config

Targets

    • Target

      EC790BBBB3055B770F7B064F6AE6E50B82C181282976E76AE991C0E716D877E4

    • Size

      4.0MB

    • MD5

      49b6deb76be860c4fad3e67f10336e98

    • SHA1

      96fad3c08bc9802f06aa0bee7a4961b9e4ddaa72

    • SHA256

      ec790bbbb3055b770f7b064f6ae6e50b82c181282976e76ae991c0e716d877e4

    • SHA512

      218b9e23858525ac91928f7551d87629866ae1377ea34ad642db19f408539debeb77107d327bffa8b1c84b09d6fcdd5bd236d0ff918f2a5e724c6ceba8c45481

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks