General

  • Target

    67367749B03F9C49CEE8B28362944D8436D7B0D71B83FA1B2E338AF1FB1FD489

  • Size

    4.0MB

  • Sample

    220720-jvwhpaddd7

  • MD5

    7d202518e814db4b03169826dc22515e

  • SHA1

    e7a4f007f4280336a11da767906465d7a7258d13

  • SHA256

    67367749b03f9c49cee8b28362944d8436d7b0d71b83fa1b2e338af1fb1fd489

  • SHA512

    30b290ce98812104c2867a1d05d31e9d8befb14358ae00ede6e51bb9143fd008e9957ae3df94160c0132cebc1dc80c9f8586f97a90532da52f1c13ef893eee28

Malware Config

Targets

    • Target

      67367749B03F9C49CEE8B28362944D8436D7B0D71B83FA1B2E338AF1FB1FD489

    • Size

      4.0MB

    • MD5

      7d202518e814db4b03169826dc22515e

    • SHA1

      e7a4f007f4280336a11da767906465d7a7258d13

    • SHA256

      67367749b03f9c49cee8b28362944d8436d7b0d71b83fa1b2e338af1fb1fd489

    • SHA512

      30b290ce98812104c2867a1d05d31e9d8befb14358ae00ede6e51bb9143fd008e9957ae3df94160c0132cebc1dc80c9f8586f97a90532da52f1c13ef893eee28

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks