General

  • Target

    597DC8A50E53088CD1D9D95DAE5198051ADAF5E48DA11927562A576DFC3A41DA

  • Size

    4.0MB

  • Sample

    220720-jrze6sddb6

  • MD5

    8de63293135680282841ba68c874fbd7

  • SHA1

    72dbc472836440a534a2c996dcd2731f180b7182

  • SHA256

    597dc8a50e53088cd1d9d95dae5198051adaf5e48da11927562a576dfc3a41da

  • SHA512

    eed6293803513892df8179f9841f5501d3843b5ccd4fa621e31cf744a32f715aa85ddf44cb7227dabbb2a139741d30009174b91a63e7707e94be2508ec0f3cf4

Malware Config

Targets

    • Target

      597DC8A50E53088CD1D9D95DAE5198051ADAF5E48DA11927562A576DFC3A41DA

    • Size

      4.0MB

    • MD5

      8de63293135680282841ba68c874fbd7

    • SHA1

      72dbc472836440a534a2c996dcd2731f180b7182

    • SHA256

      597dc8a50e53088cd1d9d95dae5198051adaf5e48da11927562a576dfc3a41da

    • SHA512

      eed6293803513892df8179f9841f5501d3843b5ccd4fa621e31cf744a32f715aa85ddf44cb7227dabbb2a139741d30009174b91a63e7707e94be2508ec0f3cf4

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks