General

  • Target

    17AC1033AAEEEC2EB0A76D09B088C4FF375A2194DA3926515EE8272381AC0C33

  • Size

    4.0MB

  • Sample

    220720-jabb1sdba6

  • MD5

    323bdaaa697105151fa40d0bd3b73eca

  • SHA1

    4c2d4957b0188b2f9ac6366f2b8725fe4fee5140

  • SHA256

    17ac1033aaeeec2eb0a76d09b088c4ff375a2194da3926515ee8272381ac0c33

  • SHA512

    0db031a8704f735c493896866a11b0466716fbd2c8e3ca81542ab0c21611f7926947d9bd4933394187a98689a9f112c9a2c32a63e485639920bb62f03e202130

Malware Config

Targets

    • Target

      17AC1033AAEEEC2EB0A76D09B088C4FF375A2194DA3926515EE8272381AC0C33

    • Size

      4.0MB

    • MD5

      323bdaaa697105151fa40d0bd3b73eca

    • SHA1

      4c2d4957b0188b2f9ac6366f2b8725fe4fee5140

    • SHA256

      17ac1033aaeeec2eb0a76d09b088c4ff375a2194da3926515ee8272381ac0c33

    • SHA512

      0db031a8704f735c493896866a11b0466716fbd2c8e3ca81542ab0c21611f7926947d9bd4933394187a98689a9f112c9a2c32a63e485639920bb62f03e202130

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks