General

  • Target

    F03B79750CDE13E72F6CB21F0450FA4A39EB80828D8B327D9823108155F34168

  • Size

    4.0MB

  • Sample

    220720-j9dw7aeagl

  • MD5

    793f61a2f24cfb4b93fd9543eb032372

  • SHA1

    f9d7361458361485546a0ede3712f469e19c8eb8

  • SHA256

    f03b79750cde13e72f6cb21f0450fa4a39eb80828d8b327d9823108155f34168

  • SHA512

    25167074d26abc64844bbd8352ec8f0334e28d49b749fea367d9b129e0af6dd2e1622968c8d0a38486eb263b2c3ddae581adc309f58503a795cc0d22972bf728

Malware Config

Targets

    • Target

      F03B79750CDE13E72F6CB21F0450FA4A39EB80828D8B327D9823108155F34168

    • Size

      4.0MB

    • MD5

      793f61a2f24cfb4b93fd9543eb032372

    • SHA1

      f9d7361458361485546a0ede3712f469e19c8eb8

    • SHA256

      f03b79750cde13e72f6cb21f0450fa4a39eb80828d8b327d9823108155f34168

    • SHA512

      25167074d26abc64844bbd8352ec8f0334e28d49b749fea367d9b129e0af6dd2e1622968c8d0a38486eb263b2c3ddae581adc309f58503a795cc0d22972bf728

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks