General

  • Target

    32A9A7BB455B7D103AEEA00B9A85AED4A3A774E9C3230FAF3F6E88624695CAB7

  • Size

    4.0MB

  • Sample

    220720-jhedmsdbh7

  • MD5

    103a39db9949364eaa87450808934f28

  • SHA1

    83fd797c5844bc14e86295965ab6dbe284468c82

  • SHA256

    32a9a7bb455b7d103aeea00b9a85aed4a3a774e9c3230faf3f6e88624695cab7

  • SHA512

    cf60d7571a0f1f00070023b5044a4dddcc908852914fcebbbb3d95934f02ed09d5ae84cfda6dfd0928ba24d0a890112b66db9ffdd83d1f2e0241798959320148

Malware Config

Targets

    • Target

      32A9A7BB455B7D103AEEA00B9A85AED4A3A774E9C3230FAF3F6E88624695CAB7

    • Size

      4.0MB

    • MD5

      103a39db9949364eaa87450808934f28

    • SHA1

      83fd797c5844bc14e86295965ab6dbe284468c82

    • SHA256

      32a9a7bb455b7d103aeea00b9a85aed4a3a774e9c3230faf3f6e88624695cab7

    • SHA512

      cf60d7571a0f1f00070023b5044a4dddcc908852914fcebbbb3d95934f02ed09d5ae84cfda6dfd0928ba24d0a890112b66db9ffdd83d1f2e0241798959320148

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks