General

  • Target

    6DB5EB3D1D261624B6D27741641DEA379653B3A3439DB34858D83447EB88033E

  • Size

    4.0MB

  • Sample

    220720-jy4cpsdhfk

  • MD5

    513bf71bf90ad5d2dcb89a45f8fb1751

  • SHA1

    2fe88ed7c6d32008a1377cdc6391a41077155d4c

  • SHA256

    6db5eb3d1d261624b6d27741641dea379653b3a3439db34858d83447eb88033e

  • SHA512

    5035d554b60e85d1ea43f0b21dddceadfcb78927a5ab6872aad2ebb7bf2bb0c90f234fb23209f3575f331fe9cd8af6d69cb0b3ce68132d2b10ff94f6c1ec51fb

Malware Config

Targets

    • Target

      6DB5EB3D1D261624B6D27741641DEA379653B3A3439DB34858D83447EB88033E

    • Size

      4.0MB

    • MD5

      513bf71bf90ad5d2dcb89a45f8fb1751

    • SHA1

      2fe88ed7c6d32008a1377cdc6391a41077155d4c

    • SHA256

      6db5eb3d1d261624b6d27741641dea379653b3a3439db34858d83447eb88033e

    • SHA512

      5035d554b60e85d1ea43f0b21dddceadfcb78927a5ab6872aad2ebb7bf2bb0c90f234fb23209f3575f331fe9cd8af6d69cb0b3ce68132d2b10ff94f6c1ec51fb

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks