General

  • Target

    508832B628AD47FB6B2467BF99E5E6B9109969E81AA6F9C2704361DF6ED36FA4

  • Size

    4.0MB

  • Sample

    220720-jps6dadch3

  • MD5

    a336f951fa34705404249a142a8e28f2

  • SHA1

    66f6f2b6275d6df8832e78005ad88c7ea14cfe55

  • SHA256

    508832b628ad47fb6b2467bf99e5e6b9109969e81aa6f9c2704361df6ed36fa4

  • SHA512

    2c30071ed655cb0c7eff4bfb654c21ac892a84848f1ded0984ae5e46da3eb0c6bd886857e33cbc76eb99f7a62d902c39941f8fee389bcb6e455eb9b9955125c2

Malware Config

Targets

    • Target

      508832B628AD47FB6B2467BF99E5E6B9109969E81AA6F9C2704361DF6ED36FA4

    • Size

      4.0MB

    • MD5

      a336f951fa34705404249a142a8e28f2

    • SHA1

      66f6f2b6275d6df8832e78005ad88c7ea14cfe55

    • SHA256

      508832b628ad47fb6b2467bf99e5e6b9109969e81aa6f9c2704361df6ed36fa4

    • SHA512

      2c30071ed655cb0c7eff4bfb654c21ac892a84848f1ded0984ae5e46da3eb0c6bd886857e33cbc76eb99f7a62d902c39941f8fee389bcb6e455eb9b9955125c2

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks