General

  • Target

    ABCBC149F7CAAD29D2AA2319824554F5B8862EA4D2B6E9C6DAE718407DA8BD92

  • Size

    4.0MB

  • Sample

    220727-hbmwrsbbdr

  • MD5

    eda07d446b4e8f47207e92c0830aece5

  • SHA1

    22856a9b19b6de9cdba9c3411e90af3b459553f0

  • SHA256

    abcbc149f7caad29d2aa2319824554f5b8862ea4d2b6e9c6dae718407da8bd92

  • SHA512

    10e2ff23e6dbd699f851caaad3a3511c4a4500df51f5a1271eced2574f5192441925b6fe78d7907ed82ed0d5a7685d75d24d41ea77df3cdebfe20bf21cbad6b8

Malware Config

Targets

    • Target

      ABCBC149F7CAAD29D2AA2319824554F5B8862EA4D2B6E9C6DAE718407DA8BD92

    • Size

      4.0MB

    • MD5

      eda07d446b4e8f47207e92c0830aece5

    • SHA1

      22856a9b19b6de9cdba9c3411e90af3b459553f0

    • SHA256

      abcbc149f7caad29d2aa2319824554f5b8862ea4d2b6e9c6dae718407da8bd92

    • SHA512

      10e2ff23e6dbd699f851caaad3a3511c4a4500df51f5a1271eced2574f5192441925b6fe78d7907ed82ed0d5a7685d75d24d41ea77df3cdebfe20bf21cbad6b8

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks