General

  • Target

    1E689CA8296EC484202E34A4A6BA366AA1F6CD0AD9DBB9A1D81851DD759905BA

  • Size

    4.0MB

  • Sample

    220720-jbnczadfbq

  • MD5

    1a29b82ff9b490de8c5964df0ba10012

  • SHA1

    6cbf1ab13603f135de600bbb3f7faca39d79bc59

  • SHA256

    1e689ca8296ec484202e34a4a6ba366aa1f6cd0ad9dbb9a1d81851dd759905ba

  • SHA512

    c9b1043da408295370ad1b7db07fb7f0d69255585b67b6df9ed00738ad0160d7d10ca0f0bf2f43d41c0b4d4fb597d615f7e2b8035246f2674889430bae7d940f

Malware Config

Targets

    • Target

      1E689CA8296EC484202E34A4A6BA366AA1F6CD0AD9DBB9A1D81851DD759905BA

    • Size

      4.0MB

    • MD5

      1a29b82ff9b490de8c5964df0ba10012

    • SHA1

      6cbf1ab13603f135de600bbb3f7faca39d79bc59

    • SHA256

      1e689ca8296ec484202e34a4a6ba366aa1f6cd0ad9dbb9a1d81851dd759905ba

    • SHA512

      c9b1043da408295370ad1b7db07fb7f0d69255585b67b6df9ed00738ad0160d7d10ca0f0bf2f43d41c0b4d4fb597d615f7e2b8035246f2674889430bae7d940f

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks