General

  • Target

    6CB421E2A0C187016E243D0BEE3BFF810CC6D57D760CB14C13A41156224A2398

  • Size

    4.0MB

  • Sample

    220720-jyflmsddf7

  • MD5

    626c9bc075583c1f87e0283f23159f16

  • SHA1

    4f1a331aa8d7bd78313ec9eebdee727d4f560866

  • SHA256

    6cb421e2a0c187016e243d0bee3bff810cc6d57d760cb14c13a41156224a2398

  • SHA512

    49d3f590d0c19526c2bb51dfda53b27c03f5414d47fac4116f6bc4b61f372e6d7327de967f65e17482a13174ba23b7f40db95b4fba1b09166f25a853f8fcc7c2

Malware Config

Targets

    • Target

      6CB421E2A0C187016E243D0BEE3BFF810CC6D57D760CB14C13A41156224A2398

    • Size

      4.0MB

    • MD5

      626c9bc075583c1f87e0283f23159f16

    • SHA1

      4f1a331aa8d7bd78313ec9eebdee727d4f560866

    • SHA256

      6cb421e2a0c187016e243d0bee3bff810cc6d57d760cb14c13a41156224a2398

    • SHA512

      49d3f590d0c19526c2bb51dfda53b27c03f5414d47fac4116f6bc4b61f372e6d7327de967f65e17482a13174ba23b7f40db95b4fba1b09166f25a853f8fcc7c2

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks