General

  • Target

    F9DD40A69DAF9D694CDB75A559AC3FACE7C287FF0FAA0B9C234D0EC27E4471FA

  • Size

    4.0MB

  • Sample

    220720-j929sadef5

  • MD5

    2bba15a416644ed5a841da36e7dd18e1

  • SHA1

    39140a51740e51ce8e7410dc0b6cb403a67477d2

  • SHA256

    f9dd40a69daf9d694cdb75a559ac3face7c287ff0faa0b9c234d0ec27e4471fa

  • SHA512

    6dba42cf8f9b8fd5be61b4680609227a735e35ae116bb63ea27e1ae22e2271189ad385eace31acd0aa45ad89a221656ca62399c5dfcf43a803628cef5f8b8e43

Malware Config

Targets

    • Target

      F9DD40A69DAF9D694CDB75A559AC3FACE7C287FF0FAA0B9C234D0EC27E4471FA

    • Size

      4.0MB

    • MD5

      2bba15a416644ed5a841da36e7dd18e1

    • SHA1

      39140a51740e51ce8e7410dc0b6cb403a67477d2

    • SHA256

      f9dd40a69daf9d694cdb75a559ac3face7c287ff0faa0b9c234d0ec27e4471fa

    • SHA512

      6dba42cf8f9b8fd5be61b4680609227a735e35ae116bb63ea27e1ae22e2271189ad385eace31acd0aa45ad89a221656ca62399c5dfcf43a803628cef5f8b8e43

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks