General

  • Target

    7A893B7463E6E6432F9949C53687A4B2BC4F54AD2D206F90FACA1D37E8C82947

  • Size

    4.0MB

  • Sample

    220727-hag9wseff2

  • MD5

    d42178bbf32e0a53019634d8c60ef9de

  • SHA1

    fcf8b4bbdd52b5f1b4b16b0084aaaa02fdf2be8d

  • SHA256

    7a893b7463e6e6432f9949c53687a4b2bc4f54ad2d206f90faca1d37e8c82947

  • SHA512

    efae5a61c2a184dcf2266b29bddb6b6ba841d517624edc7b43d108efd18bfadad860b3574d431604ffa12b9b24e71903caa5ecf927e3e40bb86e0108784a59a9

Malware Config

Targets

    • Target

      7A893B7463E6E6432F9949C53687A4B2BC4F54AD2D206F90FACA1D37E8C82947

    • Size

      4.0MB

    • MD5

      d42178bbf32e0a53019634d8c60ef9de

    • SHA1

      fcf8b4bbdd52b5f1b4b16b0084aaaa02fdf2be8d

    • SHA256

      7a893b7463e6e6432f9949c53687a4b2bc4f54ad2d206f90faca1d37e8c82947

    • SHA512

      efae5a61c2a184dcf2266b29bddb6b6ba841d517624edc7b43d108efd18bfadad860b3574d431604ffa12b9b24e71903caa5ecf927e3e40bb86e0108784a59a9

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks