General

  • Target

    640DEECFFDA273785A936B0D985CEDD6DDF222CD5723C7E72D23C79B240406EE

  • Size

    4.0MB

  • Sample

    220720-jtlbbsddc6

  • MD5

    2abc7c7ee9cd882b341fc293f5a7eecc

  • SHA1

    e724d6c696a937c986b3f747351e47c867706946

  • SHA256

    640deecffda273785a936b0d985cedd6ddf222cd5723c7e72d23c79b240406ee

  • SHA512

    7d975c35a7ffee2828bfd3bb46084f3f4cea2b6b5c0d4ac942d909d9e7c352caa746dceb3ed7f564ea38e4a16e03ce231732047c346b2a68f2712563cf58795d

Malware Config

Targets

    • Target

      640DEECFFDA273785A936B0D985CEDD6DDF222CD5723C7E72D23C79B240406EE

    • Size

      4.0MB

    • MD5

      2abc7c7ee9cd882b341fc293f5a7eecc

    • SHA1

      e724d6c696a937c986b3f747351e47c867706946

    • SHA256

      640deecffda273785a936b0d985cedd6ddf222cd5723c7e72d23c79b240406ee

    • SHA512

      7d975c35a7ffee2828bfd3bb46084f3f4cea2b6b5c0d4ac942d909d9e7c352caa746dceb3ed7f564ea38e4a16e03ce231732047c346b2a68f2712563cf58795d

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks