General

  • Target

    24721A4F863D03EBD776588CE9723C2F463DB6B39D83787EDF3AE16D6490A46C

  • Size

    4.0MB

  • Sample

    220720-jdtyjadbe2

  • MD5

    c0b2c318ed4532b8255413da7cb10316

  • SHA1

    cc85fe48edf93d0aab2224e79d36c77dedb511fe

  • SHA256

    24721a4f863d03ebd776588ce9723c2f463db6b39d83787edf3ae16d6490a46c

  • SHA512

    0f1bab9eacf3ae2e4d280f7b42137a9af0f3b7eecc2b0df5796b35bdab8ee236a769a287104449ecaea3f1a49f72672f23a8b72bb9389c0bc5bdbd193f2b9771

Malware Config

Targets

    • Target

      24721A4F863D03EBD776588CE9723C2F463DB6B39D83787EDF3AE16D6490A46C

    • Size

      4.0MB

    • MD5

      c0b2c318ed4532b8255413da7cb10316

    • SHA1

      cc85fe48edf93d0aab2224e79d36c77dedb511fe

    • SHA256

      24721a4f863d03ebd776588ce9723c2f463db6b39d83787edf3ae16d6490a46c

    • SHA512

      0f1bab9eacf3ae2e4d280f7b42137a9af0f3b7eecc2b0df5796b35bdab8ee236a769a287104449ecaea3f1a49f72672f23a8b72bb9389c0bc5bdbd193f2b9771

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks