General

  • Target

    28AA7376A0FAAF6BC069D5A6B112BBDB4D5E580F9C8D075DF7811F444B97D8F5

  • Size

    4.0MB

  • Sample

    220720-jezv6sdffk

  • MD5

    36ad65689efdd1cbc9bfbb0741e0bf0c

  • SHA1

    a67710c5e20f34a8d3f222168991ad68d1e9c63e

  • SHA256

    28aa7376a0faaf6bc069d5a6b112bbdb4d5e580f9c8d075df7811f444b97d8f5

  • SHA512

    4323fe32be08dbab6b9ba981a1e3ca8a7d97ffe90f0b5ea72f78350868fe103570c960753e035927758e72bba7cee712997193d198dbfd04ef6ba374acd5fe0d

Malware Config

Targets

    • Target

      28AA7376A0FAAF6BC069D5A6B112BBDB4D5E580F9C8D075DF7811F444B97D8F5

    • Size

      4.0MB

    • MD5

      36ad65689efdd1cbc9bfbb0741e0bf0c

    • SHA1

      a67710c5e20f34a8d3f222168991ad68d1e9c63e

    • SHA256

      28aa7376a0faaf6bc069d5a6b112bbdb4d5e580f9c8d075df7811f444b97d8f5

    • SHA512

      4323fe32be08dbab6b9ba981a1e3ca8a7d97ffe90f0b5ea72f78350868fe103570c960753e035927758e72bba7cee712997193d198dbfd04ef6ba374acd5fe0d

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks