General

  • Target

    262DD6C5D9DDAD7CCD87119B794FF2F2B50C9668B7D15349CE6D0880FC0A55A6

  • Size

    4.0MB

  • Sample

    220720-jd9nzsdbe8

  • MD5

    8e070078e871a5432d5e1d4b6fe8fca0

  • SHA1

    87bc4299572fac73c9929ed044ba61324b7b8058

  • SHA256

    262dd6c5d9ddad7ccd87119b794ff2f2b50c9668b7d15349ce6d0880fc0a55a6

  • SHA512

    ae7978be5c348325ba1a68ed543bc8dc0aaa2b6ac57348b424f9cd6ec84304c6d72203f6a3d170abc12fd3461be21920d83e98d53f1d35163c92e597c004d8a8

Malware Config

Targets

    • Target

      262DD6C5D9DDAD7CCD87119B794FF2F2B50C9668B7D15349CE6D0880FC0A55A6

    • Size

      4.0MB

    • MD5

      8e070078e871a5432d5e1d4b6fe8fca0

    • SHA1

      87bc4299572fac73c9929ed044ba61324b7b8058

    • SHA256

      262dd6c5d9ddad7ccd87119b794ff2f2b50c9668b7d15349ce6d0880fc0a55a6

    • SHA512

      ae7978be5c348325ba1a68ed543bc8dc0aaa2b6ac57348b424f9cd6ec84304c6d72203f6a3d170abc12fd3461be21920d83e98d53f1d35163c92e597c004d8a8

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks