General

  • Target

    20E7976E0375EDA4DD1796AD3DD475C3BDDB21DB05FF5A2C5FD81A45D4A74C67

  • Size

    4.0MB

  • Sample

    220720-jc5zeadbd6

  • MD5

    8fa321838211901a4683db1390156dd0

  • SHA1

    24ab436044684514666f0acbf56040cd51dece9e

  • SHA256

    20e7976e0375eda4dd1796ad3dd475c3bddb21db05ff5a2c5fd81a45d4a74c67

  • SHA512

    826bd13eae01f89e2c852241f5d7b7be1b7c1666b119050b0b00cc2126e70cc4bb5af5cafbeb7c917c0735f9a7a7b96cf31b42e3010b816e346e9c73dbbe8ef0

Malware Config

Targets

    • Target

      20E7976E0375EDA4DD1796AD3DD475C3BDDB21DB05FF5A2C5FD81A45D4A74C67

    • Size

      4.0MB

    • MD5

      8fa321838211901a4683db1390156dd0

    • SHA1

      24ab436044684514666f0acbf56040cd51dece9e

    • SHA256

      20e7976e0375eda4dd1796ad3dd475c3bddb21db05ff5a2c5fd81a45d4a74c67

    • SHA512

      826bd13eae01f89e2c852241f5d7b7be1b7c1666b119050b0b00cc2126e70cc4bb5af5cafbeb7c917c0735f9a7a7b96cf31b42e3010b816e346e9c73dbbe8ef0

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks