General

  • Target

    54745BB64D8CEEE10DE529A681DF3EC02B7ADF95F6B9836D9034395A5B9E2655

  • Size

    4.0MB

  • Sample

    220720-jq9jradggr

  • MD5

    75ee3bb0a1b6eb046aeec79eda7f401b

  • SHA1

    eaea935d6bdea870576c5eb4d6530b9824c927c3

  • SHA256

    54745bb64d8ceee10de529a681df3ec02b7adf95f6b9836d9034395a5b9e2655

  • SHA512

    e7251f2311bb49618aa468d5a879f02810bf89652449eb1d7d55bde09d6a56a7bb37468346321706cc4e68186c791758ce96fa641ae800133b038a87d9e94986

Malware Config

Targets

    • Target

      54745BB64D8CEEE10DE529A681DF3EC02B7ADF95F6B9836D9034395A5B9E2655

    • Size

      4.0MB

    • MD5

      75ee3bb0a1b6eb046aeec79eda7f401b

    • SHA1

      eaea935d6bdea870576c5eb4d6530b9824c927c3

    • SHA256

      54745bb64d8ceee10de529a681df3ec02b7adf95f6b9836d9034395a5b9e2655

    • SHA512

      e7251f2311bb49618aa468d5a879f02810bf89652449eb1d7d55bde09d6a56a7bb37468346321706cc4e68186c791758ce96fa641ae800133b038a87d9e94986

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks