General

  • Target

    30DB81495DA8ED2569C3D3DB00AD3F475B808B1384D8AC1374A30773B9164ED9

  • Size

    4.0MB

  • Sample

    220720-jgjxqsdbh2

  • MD5

    a35dde4d696eae7395a9770456a2f6d6

  • SHA1

    5a351bb8cb5fc5e336faf84094af9aa7bfe12801

  • SHA256

    30db81495da8ed2569c3d3db00ad3f475b808b1384d8ac1374a30773b9164ed9

  • SHA512

    a4123d86ca313842ed343762319a0c69b4b8e06f29a47ea9cc0019fc4f6240ed7b997145f5b555daf03e22935015b2cc299f3df1bec338151735425b91ec3822

Malware Config

Targets

    • Target

      30DB81495DA8ED2569C3D3DB00AD3F475B808B1384D8AC1374A30773B9164ED9

    • Size

      4.0MB

    • MD5

      a35dde4d696eae7395a9770456a2f6d6

    • SHA1

      5a351bb8cb5fc5e336faf84094af9aa7bfe12801

    • SHA256

      30db81495da8ed2569c3d3db00ad3f475b808b1384d8ac1374a30773b9164ed9

    • SHA512

      a4123d86ca313842ed343762319a0c69b4b8e06f29a47ea9cc0019fc4f6240ed7b997145f5b555daf03e22935015b2cc299f3df1bec338151735425b91ec3822

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks