General

  • Target

    AEDB009107F787D287D8C6D96AEA50F07A1E68D005D4DB4E00701D03F0E99DEC

  • Size

    4.0MB

  • Sample

    220727-hb9ersefh6

  • MD5

    ff63970655db3949bba30d372ea7732f

  • SHA1

    64426330be903de91b043809b5b08301ed361528

  • SHA256

    aedb009107f787d287d8c6d96aea50f07a1e68d005d4db4e00701d03f0e99dec

  • SHA512

    0c33c25a253980c7f00c548b1d37ded52a379bdae48bfbb8060157dc40e4d42a2209277b38af95445d5549349e1d9cd8bbc301847f0d388c7458aa6803ae72f5

Malware Config

Targets

    • Target

      AEDB009107F787D287D8C6D96AEA50F07A1E68D005D4DB4E00701D03F0E99DEC

    • Size

      4.0MB

    • MD5

      ff63970655db3949bba30d372ea7732f

    • SHA1

      64426330be903de91b043809b5b08301ed361528

    • SHA256

      aedb009107f787d287d8c6d96aea50f07a1e68d005d4db4e00701d03f0e99dec

    • SHA512

      0c33c25a253980c7f00c548b1d37ded52a379bdae48bfbb8060157dc40e4d42a2209277b38af95445d5549349e1d9cd8bbc301847f0d388c7458aa6803ae72f5

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks