General

  • Target

    69CBA225ED4D14A6465DBDED19C12E9B4E0F383D37C2344299CEAB609E6CCDBA

  • Size

    4.0MB

  • Sample

    220720-jxs6cadhdr

  • MD5

    e86316a486464ddcedc758fa87728e77

  • SHA1

    4809d89e594ae4e7ec6734ac36d5e928bc998183

  • SHA256

    69cba225ed4d14a6465dbded19c12e9b4e0f383d37c2344299ceab609e6ccdba

  • SHA512

    15bed949150a3c19a9b4aee6665ed063eb6bb79b09ed2232f7c21aa3566e19f0d042170a571e7c8ae42579dc75142bc707a57af4972d8a676d043fe9d2894f74

Malware Config

Targets

    • Target

      69CBA225ED4D14A6465DBDED19C12E9B4E0F383D37C2344299CEAB609E6CCDBA

    • Size

      4.0MB

    • MD5

      e86316a486464ddcedc758fa87728e77

    • SHA1

      4809d89e594ae4e7ec6734ac36d5e928bc998183

    • SHA256

      69cba225ed4d14a6465dbded19c12e9b4e0f383d37c2344299ceab609e6ccdba

    • SHA512

      15bed949150a3c19a9b4aee6665ed063eb6bb79b09ed2232f7c21aa3566e19f0d042170a571e7c8ae42579dc75142bc707a57af4972d8a676d043fe9d2894f74

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks