General

  • Target

    543E5E57E1A2D7763B84E5E3F605E76EA06959CE6BB071D7FFD50DD11860E037

  • Size

    4.0MB

  • Sample

    220720-jqzpjsdda5

  • MD5

    a8efef1066ab1629b3a4d7541adf2ea1

  • SHA1

    3de453d7d1e4e30f128578cf1ab9e63a2b20b5ad

  • SHA256

    543e5e57e1a2d7763b84e5e3f605e76ea06959ce6bb071d7ffd50dd11860e037

  • SHA512

    d26e93b1d51bc079bbfaff8531aa4d5e205d0002f8d0eea788455b62f05599cb6f858dcba2532b7bf531daa362b6a91bec91cfa1710aaec3acd3ba1f4d3d21b8

Malware Config

Targets

    • Target

      543E5E57E1A2D7763B84E5E3F605E76EA06959CE6BB071D7FFD50DD11860E037

    • Size

      4.0MB

    • MD5

      a8efef1066ab1629b3a4d7541adf2ea1

    • SHA1

      3de453d7d1e4e30f128578cf1ab9e63a2b20b5ad

    • SHA256

      543e5e57e1a2d7763b84e5e3f605e76ea06959ce6bb071d7ffd50dd11860e037

    • SHA512

      d26e93b1d51bc079bbfaff8531aa4d5e205d0002f8d0eea788455b62f05599cb6f858dcba2532b7bf531daa362b6a91bec91cfa1710aaec3acd3ba1f4d3d21b8

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks