General

  • Target

    426807CEFCC43EF1BB6661A63E749C6EC3FE6CC5BE027ADF5F76C37A70789A72

  • Size

    4.0MB

  • Sample

    220720-jlb3padcc9

  • MD5

    5df125ef684161397b4d35c96353d14e

  • SHA1

    ee5d06448e84460c5d4c1a96290136ef335ccca3

  • SHA256

    426807cefcc43ef1bb6661a63e749c6ec3fe6cc5be027adf5f76c37a70789a72

  • SHA512

    a0b5838522e60bcbc4ac82dd54b7f907d96b053c7f2dd4b51359de07f507e862f488a5109f2339a8e48d35a0fdaa12b4ff4cca4189e25d02b4fa636fd61cf90e

Malware Config

Targets

    • Target

      426807CEFCC43EF1BB6661A63E749C6EC3FE6CC5BE027ADF5F76C37A70789A72

    • Size

      4.0MB

    • MD5

      5df125ef684161397b4d35c96353d14e

    • SHA1

      ee5d06448e84460c5d4c1a96290136ef335ccca3

    • SHA256

      426807cefcc43ef1bb6661a63e749c6ec3fe6cc5be027adf5f76c37a70789a72

    • SHA512

      a0b5838522e60bcbc4ac82dd54b7f907d96b053c7f2dd4b51359de07f507e862f488a5109f2339a8e48d35a0fdaa12b4ff4cca4189e25d02b4fa636fd61cf90e

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks