General

  • Target

    66700485FD96EF2CBA4E6A7089D34586D2330FA67B10EE51BE9C3D1911EC53E7

  • Size

    4.0MB

  • Sample

    220720-jvmksadhcj

  • MD5

    d557b2f69defa06f1a2f6eba633c8d35

  • SHA1

    26b2bb7c101e1ccd03c6e579b47eecc3e258b5e8

  • SHA256

    66700485fd96ef2cba4e6a7089d34586d2330fa67b10ee51be9c3d1911ec53e7

  • SHA512

    f935e6227a19c316b54df412122852b0de0a190515454bf05692187b5a971a3a5dbe639450edea3c041ea58607afb486afc1e5922ca09d7f988e001b87e01608

Malware Config

Targets

    • Target

      66700485FD96EF2CBA4E6A7089D34586D2330FA67B10EE51BE9C3D1911EC53E7

    • Size

      4.0MB

    • MD5

      d557b2f69defa06f1a2f6eba633c8d35

    • SHA1

      26b2bb7c101e1ccd03c6e579b47eecc3e258b5e8

    • SHA256

      66700485fd96ef2cba4e6a7089d34586d2330fa67b10ee51be9c3d1911ec53e7

    • SHA512

      f935e6227a19c316b54df412122852b0de0a190515454bf05692187b5a971a3a5dbe639450edea3c041ea58607afb486afc1e5922ca09d7f988e001b87e01608

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks