General

  • Target

    C0B2AC77110496B5B198009591A3F32003951DF0FC1957D872E85CE78297CBF4

  • Size

    4.0MB

  • Sample

    220720-jzpkyaddg8

  • MD5

    3c9360cc3220914c4ec250ff10f96c7a

  • SHA1

    7d23d7b8d3325d05c2fdfc440e879664e0996efb

  • SHA256

    c0b2ac77110496b5b198009591a3f32003951df0fc1957d872e85ce78297cbf4

  • SHA512

    36a735cfeaf2f7c52ba1a36962073bc5e44fd837b6eea7cca728cb602f967c7765101300177a8395492d28bb233a5df985b4addf8eb20c93bad3c02c85d8f3aa

Malware Config

Targets

    • Target

      C0B2AC77110496B5B198009591A3F32003951DF0FC1957D872E85CE78297CBF4

    • Size

      4.0MB

    • MD5

      3c9360cc3220914c4ec250ff10f96c7a

    • SHA1

      7d23d7b8d3325d05c2fdfc440e879664e0996efb

    • SHA256

      c0b2ac77110496b5b198009591a3f32003951df0fc1957d872e85ce78297cbf4

    • SHA512

      36a735cfeaf2f7c52ba1a36962073bc5e44fd837b6eea7cca728cb602f967c7765101300177a8395492d28bb233a5df985b4addf8eb20c93bad3c02c85d8f3aa

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks