General

  • Target

    6410DC559D1015DF969EBE04CE0A6FF1FC066F4810B64A7333467672102A0CE5

  • Size

    4.0MB

  • Sample

    220720-jtqwtaddc7

  • MD5

    8453cfb603798633aadbf24de5d4d9cf

  • SHA1

    3a71343036fb408dfa96be4cad0ab05c00a95d60

  • SHA256

    6410dc559d1015df969ebe04ce0a6ff1fc066f4810b64a7333467672102a0ce5

  • SHA512

    45e72e8c38132ccf327aae6d560ba7d153b25fc3170e454de2e7f081631fcecfb7f276a68f56990446eebd9a6329d64018182d00bb1a37b1a07c6fae11caafc3

Malware Config

Targets

    • Target

      6410DC559D1015DF969EBE04CE0A6FF1FC066F4810B64A7333467672102A0CE5

    • Size

      4.0MB

    • MD5

      8453cfb603798633aadbf24de5d4d9cf

    • SHA1

      3a71343036fb408dfa96be4cad0ab05c00a95d60

    • SHA256

      6410dc559d1015df969ebe04ce0a6ff1fc066f4810b64a7333467672102a0ce5

    • SHA512

      45e72e8c38132ccf327aae6d560ba7d153b25fc3170e454de2e7f081631fcecfb7f276a68f56990446eebd9a6329d64018182d00bb1a37b1a07c6fae11caafc3

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks