General

  • Target

    570D17864E861BFB93373CCC3A708F1AC7DDC2EF7EC40DCD45253F1B99BBA42D

  • Size

    4.0MB

  • Sample

    220720-jrt6fsddb5

  • MD5

    27d237745dac895b5d08bcc11e5fc4d8

  • SHA1

    063d948755ac6ce64a1281e79fcaef7dc25cd12b

  • SHA256

    570d17864e861bfb93373ccc3a708f1ac7ddc2ef7ec40dcd45253f1b99bba42d

  • SHA512

    51fdb307806811b5bccf9f4f5a59b69808eb74c867af52b66a52f6b17be5024390a4329a455c69ad9430c220531a22506aaa2f32c56e5ec5fdc3f66c07fb7e70

Malware Config

Targets

    • Target

      570D17864E861BFB93373CCC3A708F1AC7DDC2EF7EC40DCD45253F1B99BBA42D

    • Size

      4.0MB

    • MD5

      27d237745dac895b5d08bcc11e5fc4d8

    • SHA1

      063d948755ac6ce64a1281e79fcaef7dc25cd12b

    • SHA256

      570d17864e861bfb93373ccc3a708f1ac7ddc2ef7ec40dcd45253f1b99bba42d

    • SHA512

      51fdb307806811b5bccf9f4f5a59b69808eb74c867af52b66a52f6b17be5024390a4329a455c69ad9430c220531a22506aaa2f32c56e5ec5fdc3f66c07fb7e70

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks