General

  • Target

    FFF0E26AAE680838B8EA5DBC1AABD471263414D605860B84D22B2EB6DE7568B6

  • Size

    4.0MB

  • Sample

    220720-kbdzzaebar

  • MD5

    83603028d9dd3d4401a1460220df722b

  • SHA1

    b87cc0c7caa28a70e2fb51501e6f8d42c3fd20f4

  • SHA256

    fff0e26aae680838b8ea5dbc1aabd471263414d605860b84d22b2eb6de7568b6

  • SHA512

    7d60f41996fa2315a56be42a0662339b293504efb77d06dbd518718070716481fb1f413b1b54b8a26f0a4fb2bfe3275e0659a59ab5c4c892af17a73766ac1153

Malware Config

Targets

    • Target

      FFF0E26AAE680838B8EA5DBC1AABD471263414D605860B84D22B2EB6DE7568B6

    • Size

      4.0MB

    • MD5

      83603028d9dd3d4401a1460220df722b

    • SHA1

      b87cc0c7caa28a70e2fb51501e6f8d42c3fd20f4

    • SHA256

      fff0e26aae680838b8ea5dbc1aabd471263414d605860b84d22b2eb6de7568b6

    • SHA512

      7d60f41996fa2315a56be42a0662339b293504efb77d06dbd518718070716481fb1f413b1b54b8a26f0a4fb2bfe3275e0659a59ab5c4c892af17a73766ac1153

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks