General

  • Target

    2CED681E3ECE2AAB547683B77B59AC24B72DDA095AB37CD4BDBF7DE47D9D356A

  • Size

    4.0MB

  • Sample

    220720-jfv9dadbg4

  • MD5

    67891cd60e6fc2e1acbc9fe6dc5ceac9

  • SHA1

    374f5e49e0dccc49d4642b055e8554d23f8446d1

  • SHA256

    2ced681e3ece2aab547683b77b59ac24b72dda095ab37cd4bdbf7de47d9d356a

  • SHA512

    b35da63a7158c33dc13f6144ded2f33f1c83221b8026c05414755fad4d12337e035d9da9f86539c17741451844ddf199d21e3ff046c069ac6e3fbc33b27baf80

Malware Config

Targets

    • Target

      2CED681E3ECE2AAB547683B77B59AC24B72DDA095AB37CD4BDBF7DE47D9D356A

    • Size

      4.0MB

    • MD5

      67891cd60e6fc2e1acbc9fe6dc5ceac9

    • SHA1

      374f5e49e0dccc49d4642b055e8554d23f8446d1

    • SHA256

      2ced681e3ece2aab547683b77b59ac24b72dda095ab37cd4bdbf7de47d9d356a

    • SHA512

      b35da63a7158c33dc13f6144ded2f33f1c83221b8026c05414755fad4d12337e035d9da9f86539c17741451844ddf199d21e3ff046c069ac6e3fbc33b27baf80

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks