General

  • Target

    2D79DB60D7D4CE0C74D1B66C542803847DFFABB9F6B3BE95D0A220F2BD5E5349

  • Size

    4.0MB

  • Sample

    220720-jf1tvsdfgj

  • MD5

    ee22554a6e785e724d7e6a1679eb2247

  • SHA1

    1194a27805b1e88c060681ed1b167cf90cda8872

  • SHA256

    2d79db60d7d4ce0c74d1b66c542803847dffabb9f6b3be95d0a220f2bd5e5349

  • SHA512

    1ece90a9c64ed939afa214bbed02069472b88265e14ee80895f19fa8544cd6961158e698622e8ac3560b404ad2e8e37824bd86a83a1112c93e57c4b9da2ae971

Malware Config

Targets

    • Target

      2D79DB60D7D4CE0C74D1B66C542803847DFFABB9F6B3BE95D0A220F2BD5E5349

    • Size

      4.0MB

    • MD5

      ee22554a6e785e724d7e6a1679eb2247

    • SHA1

      1194a27805b1e88c060681ed1b167cf90cda8872

    • SHA256

      2d79db60d7d4ce0c74d1b66c542803847dffabb9f6b3be95d0a220f2bd5e5349

    • SHA512

      1ece90a9c64ed939afa214bbed02069472b88265e14ee80895f19fa8544cd6961158e698622e8ac3560b404ad2e8e37824bd86a83a1112c93e57c4b9da2ae971

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks