General

  • Target

    FB751491C543070662125BBC19DF830C9CBA69171FBFD2F5C631C00470ADF473

  • Size

    4.0MB

  • Sample

    220720-katzssebal

  • MD5

    fcb6da1d4570e738e30c6c00399361fa

  • SHA1

    abd06452a76661669cdace57eee7caaa56c98c1b

  • SHA256

    fb751491c543070662125bbc19df830c9cba69171fbfd2f5c631c00470adf473

  • SHA512

    6cfaa80c38acec1147a6294e9ba3a2a5998171a05b7fa598cdd1daf264f18221067e4ef0e7dc4a1d123a6f9a44546bcbccd397aa421815477f7a10c5b11a4cec

Malware Config

Targets

    • Target

      FB751491C543070662125BBC19DF830C9CBA69171FBFD2F5C631C00470ADF473

    • Size

      4.0MB

    • MD5

      fcb6da1d4570e738e30c6c00399361fa

    • SHA1

      abd06452a76661669cdace57eee7caaa56c98c1b

    • SHA256

      fb751491c543070662125bbc19df830c9cba69171fbfd2f5c631c00470adf473

    • SHA512

      6cfaa80c38acec1147a6294e9ba3a2a5998171a05b7fa598cdd1daf264f18221067e4ef0e7dc4a1d123a6f9a44546bcbccd397aa421815477f7a10c5b11a4cec

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks