General

  • Target

    2A180E506072E6E9B75D10EF5BB660814AB2618C8317B1315DF92256DCB1FFFD

  • Size

    4.0MB

  • Sample

    220720-je7wsadbf2

  • MD5

    1a601b62d55581be1b8bfca6b37708d5

  • SHA1

    3c36fe39ddc349a24f636536f8837de0cd022568

  • SHA256

    2a180e506072e6e9b75d10ef5bb660814ab2618c8317b1315df92256dcb1fffd

  • SHA512

    3446ef199888860a70e051084f33a3365148ac3b23efdf2b384dcb5d1f256af4e81daa9d9c47e7fbddb7e064a9784436f9cdce561332f38ba9d11939aea9e223

Malware Config

Targets

    • Target

      2A180E506072E6E9B75D10EF5BB660814AB2618C8317B1315DF92256DCB1FFFD

    • Size

      4.0MB

    • MD5

      1a601b62d55581be1b8bfca6b37708d5

    • SHA1

      3c36fe39ddc349a24f636536f8837de0cd022568

    • SHA256

      2a180e506072e6e9b75d10ef5bb660814ab2618c8317b1315df92256dcb1fffd

    • SHA512

      3446ef199888860a70e051084f33a3365148ac3b23efdf2b384dcb5d1f256af4e81daa9d9c47e7fbddb7e064a9784436f9cdce561332f38ba9d11939aea9e223

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks