General

  • Target

    AD0919F0E2F934EE8FEA66D5DCE0DB81768D28675270E8B0FC3568B1BB2B4F44

  • Size

    4.0MB

  • Sample

    220727-hbx2qsefg9

  • MD5

    e8a93ad4a9f75f22d7dc4f149a8ffbab

  • SHA1

    84b49eeea55c2044147ba2e052d07fa71908b454

  • SHA256

    ad0919f0e2f934ee8fea66d5dce0db81768d28675270e8b0fc3568b1bb2b4f44

  • SHA512

    563ad465c969d2484ced0e9262dacc5feb5b55f6784caf9e55d343690c5ca7b27b94fd06d680096f64a9c24be994b3d41519cef3e75846ca675e5114ef287b91

Malware Config

Targets

    • Target

      AD0919F0E2F934EE8FEA66D5DCE0DB81768D28675270E8B0FC3568B1BB2B4F44

    • Size

      4.0MB

    • MD5

      e8a93ad4a9f75f22d7dc4f149a8ffbab

    • SHA1

      84b49eeea55c2044147ba2e052d07fa71908b454

    • SHA256

      ad0919f0e2f934ee8fea66d5dce0db81768d28675270e8b0fc3568b1bb2b4f44

    • SHA512

      563ad465c969d2484ced0e9262dacc5feb5b55f6784caf9e55d343690c5ca7b27b94fd06d680096f64a9c24be994b3d41519cef3e75846ca675e5114ef287b91

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks