General

  • Target

    1D28708D2A4BFAE897E091D1B99884F5CBEA9DA23C69646862B4CDBED5E9DA78

  • Size

    4.0MB

  • Sample

    220720-jbh39adfbp

  • MD5

    7a7301636b1d9ceba27b4b02d1922653

  • SHA1

    13cf3dfde36ecc616c8ce7afe2b740c909c29782

  • SHA256

    1d28708d2a4bfae897e091d1b99884f5cbea9da23c69646862b4cdbed5e9da78

  • SHA512

    76758d666dff1c6c9fea27a1aa6399ce0fd2c2b2615842d2637d0fa7444b042f16fd9178f5882289faac70824fc08caeba410d28fbad6595da046da8acd29943

Malware Config

Targets

    • Target

      1D28708D2A4BFAE897E091D1B99884F5CBEA9DA23C69646862B4CDBED5E9DA78

    • Size

      4.0MB

    • MD5

      7a7301636b1d9ceba27b4b02d1922653

    • SHA1

      13cf3dfde36ecc616c8ce7afe2b740c909c29782

    • SHA256

      1d28708d2a4bfae897e091d1b99884f5cbea9da23c69646862b4cdbed5e9da78

    • SHA512

      76758d666dff1c6c9fea27a1aa6399ce0fd2c2b2615842d2637d0fa7444b042f16fd9178f5882289faac70824fc08caeba410d28fbad6595da046da8acd29943

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks