General

  • Target

    6779505E5FE0F26ABE9D451E197C0ACA5BF798ACFD7CBBC3D682C98809FDEB71

  • Size

    4.0MB

  • Sample

    220720-jv9ejsdde5

  • MD5

    67c33e3168d559fed82c57a8786f5792

  • SHA1

    11aaa598f0acd9afc923e29ef20f50754a0c44f3

  • SHA256

    6779505e5fe0f26abe9d451e197c0aca5bf798acfd7cbbc3d682c98809fdeb71

  • SHA512

    a9a6c9a9ef17eeb71a9169e8bd8798ccf4842e51ee95ea8cf2c63a26835e5095418a790207d4f0d11951b511c26976e16908849348612f2da078b8db8c9d9112

Malware Config

Targets

    • Target

      6779505E5FE0F26ABE9D451E197C0ACA5BF798ACFD7CBBC3D682C98809FDEB71

    • Size

      4.0MB

    • MD5

      67c33e3168d559fed82c57a8786f5792

    • SHA1

      11aaa598f0acd9afc923e29ef20f50754a0c44f3

    • SHA256

      6779505e5fe0f26abe9d451e197c0aca5bf798acfd7cbbc3d682c98809fdeb71

    • SHA512

      a9a6c9a9ef17eeb71a9169e8bd8798ccf4842e51ee95ea8cf2c63a26835e5095418a790207d4f0d11951b511c26976e16908849348612f2da078b8db8c9d9112

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks