General

  • Target

    67B332100D772722736D2FD90514EF2AF23D84E800C880155F3DA38A21FEA829

  • Size

    4.0MB

  • Sample

    220720-jwvmsadhcq

  • MD5

    f155b0bbfef9582f2e4078f2d17e8227

  • SHA1

    657206207995bffb0579091019f77bf7ab4ae5ee

  • SHA256

    67b332100d772722736d2fd90514ef2af23d84e800c880155f3da38a21fea829

  • SHA512

    1418ef478583ca04895dd9b8a38400aaaf7d3d6de9aa5b77e0c0c96165db1a89cc8b4bd3962ac567caa9b7746f568f6f1ed691c953c66f5a17d0866c491d434b

Malware Config

Targets

    • Target

      67B332100D772722736D2FD90514EF2AF23D84E800C880155F3DA38A21FEA829

    • Size

      4.0MB

    • MD5

      f155b0bbfef9582f2e4078f2d17e8227

    • SHA1

      657206207995bffb0579091019f77bf7ab4ae5ee

    • SHA256

      67b332100d772722736d2fd90514ef2af23d84e800c880155f3da38a21fea829

    • SHA512

      1418ef478583ca04895dd9b8a38400aaaf7d3d6de9aa5b77e0c0c96165db1a89cc8b4bd3962ac567caa9b7746f568f6f1ed691c953c66f5a17d0866c491d434b

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks