General

  • Target

    EDF67AE5DF451AC301FD4DE9150C7F411203CC74D0502A178D703D0C41338187

  • Size

    4.0MB

  • Sample

    220720-j8yvzaeagj

  • MD5

    64774e4563fc0ea00c6ea1390b1bed95

  • SHA1

    3f7764cc3f2282a6c34508a26e88b7b779fb47cc

  • SHA256

    edf67ae5df451ac301fd4de9150c7f411203cc74d0502a178d703d0c41338187

  • SHA512

    9f3d4611dacb40ff4b96ef6bcac1fb734ecbd6bbfaa10799809b10ffd394e2eda540408d38b8720f39697ae963665c7c9f3321cd749fa3dd3a2eb06e42c69277

Malware Config

Targets

    • Target

      EDF67AE5DF451AC301FD4DE9150C7F411203CC74D0502A178D703D0C41338187

    • Size

      4.0MB

    • MD5

      64774e4563fc0ea00c6ea1390b1bed95

    • SHA1

      3f7764cc3f2282a6c34508a26e88b7b779fb47cc

    • SHA256

      edf67ae5df451ac301fd4de9150c7f411203cc74d0502a178d703d0c41338187

    • SHA512

      9f3d4611dacb40ff4b96ef6bcac1fb734ecbd6bbfaa10799809b10ffd394e2eda540408d38b8720f39697ae963665c7c9f3321cd749fa3dd3a2eb06e42c69277

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks