General

  • Target

    F16394A45ABD07B0B55567433611E4ABEB3521E4870C9BD117E60A4038C86D8C

  • Size

    4.0MB

  • Sample

    220720-j9jgnsdee9

  • MD5

    934c2936029b64ab1aaf6234924ef34f

  • SHA1

    3b44adb55a34a07eee4bb75d011828b1132ac600

  • SHA256

    f16394a45abd07b0b55567433611e4abeb3521e4870c9bd117e60a4038c86d8c

  • SHA512

    b252918cc3e661c9fa86ab8878ebe296e516a2613f2ec272298b19a0e3cdb9d8acf596c5bafca4c03635d4bbf5edbf910899d21ac36fa93d1d3d3403e4cbf0db

Malware Config

Targets

    • Target

      F16394A45ABD07B0B55567433611E4ABEB3521E4870C9BD117E60A4038C86D8C

    • Size

      4.0MB

    • MD5

      934c2936029b64ab1aaf6234924ef34f

    • SHA1

      3b44adb55a34a07eee4bb75d011828b1132ac600

    • SHA256

      f16394a45abd07b0b55567433611e4abeb3521e4870c9bd117e60a4038c86d8c

    • SHA512

      b252918cc3e661c9fa86ab8878ebe296e516a2613f2ec272298b19a0e3cdb9d8acf596c5bafca4c03635d4bbf5edbf910899d21ac36fa93d1d3d3403e4cbf0db

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks