General

  • Target

    F9C53AF7749C85E90301861B202C9EF764C497CDD36D3A319B5E6A42F3FD1C90

  • Size

    4.0MB

  • Sample

    220720-j9t86seahl

  • MD5

    25bc79e956dd9f108e962d1b73b45270

  • SHA1

    6ec808fe37014395282624da1ca4901d470f2773

  • SHA256

    f9c53af7749c85e90301861b202c9ef764c497cdd36d3a319b5e6a42f3fd1c90

  • SHA512

    c15e1c4c036790c7637798dbd3cb7ee693a1a30c11ca1c2039fca11624fc20b34d3a9fd111ede9d706434c096bdad2a8e2be586261b6a8e6492bde6d9bc15abf

Malware Config

Targets

    • Target

      F9C53AF7749C85E90301861B202C9EF764C497CDD36D3A319B5E6A42F3FD1C90

    • Size

      4.0MB

    • MD5

      25bc79e956dd9f108e962d1b73b45270

    • SHA1

      6ec808fe37014395282624da1ca4901d470f2773

    • SHA256

      f9c53af7749c85e90301861b202c9ef764c497cdd36d3a319b5e6a42f3fd1c90

    • SHA512

      c15e1c4c036790c7637798dbd3cb7ee693a1a30c11ca1c2039fca11624fc20b34d3a9fd111ede9d706434c096bdad2a8e2be586261b6a8e6492bde6d9bc15abf

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks