General

  • Target

    278FA2801CE607107B5BC8F07B77FC2CCE942C4911A44A702CB6BAA59868CD4F

  • Size

    4.0MB

  • Sample

    220720-jetddsdffj

  • MD5

    d806b9a73a451f7875c0233b501c6b26

  • SHA1

    04a45843a37910017c30bbc6486201793c27c50e

  • SHA256

    278fa2801ce607107b5bc8f07b77fc2cce942c4911a44a702cb6baa59868cd4f

  • SHA512

    b06537545077aa7e93814aa395f2a1a312ae651ba0917c5d25749a8d730b0f4e1e43022fd0fbb538bba5345779a7a020d870b234b88d0eaaae30e0547e48fa96

Malware Config

Targets

    • Target

      278FA2801CE607107B5BC8F07B77FC2CCE942C4911A44A702CB6BAA59868CD4F

    • Size

      4.0MB

    • MD5

      d806b9a73a451f7875c0233b501c6b26

    • SHA1

      04a45843a37910017c30bbc6486201793c27c50e

    • SHA256

      278fa2801ce607107b5bc8f07b77fc2cce942c4911a44a702cb6baa59868cd4f

    • SHA512

      b06537545077aa7e93814aa395f2a1a312ae651ba0917c5d25749a8d730b0f4e1e43022fd0fbb538bba5345779a7a020d870b234b88d0eaaae30e0547e48fa96

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks