General

  • Target

    6CA831E8CAB07DBF7F6AEC2CBACB030CCC378387327FE10B31D1C7C2F7F3361C

  • Size

    4.0MB

  • Sample

    220720-jybbxsdhek

  • MD5

    32d6d59d40090b8bddac994b25141636

  • SHA1

    8db92bb6eec24614fc3966572f11e5486ebc2259

  • SHA256

    6ca831e8cab07dbf7f6aec2cbacb030ccc378387327fe10b31d1c7c2f7f3361c

  • SHA512

    ba41d1fdb268c42eba1e0888cefb05ccb46793b798adaa34ccaaae42843c1b2b97c0e748a69acc80f86d7e95b3dcee1a623b2b2c1177044297355ee394a39803

Malware Config

Targets

    • Target

      6CA831E8CAB07DBF7F6AEC2CBACB030CCC378387327FE10B31D1C7C2F7F3361C

    • Size

      4.0MB

    • MD5

      32d6d59d40090b8bddac994b25141636

    • SHA1

      8db92bb6eec24614fc3966572f11e5486ebc2259

    • SHA256

      6ca831e8cab07dbf7f6aec2cbacb030ccc378387327fe10b31d1c7c2f7f3361c

    • SHA512

      ba41d1fdb268c42eba1e0888cefb05ccb46793b798adaa34ccaaae42843c1b2b97c0e748a69acc80f86d7e95b3dcee1a623b2b2c1177044297355ee394a39803

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks