General

  • Target

    2844e85a36a29a037eaf1273133b7a83f65c6db637443568703f0052dc7cb1c6

  • Size

    4.0MB

  • Sample

    220802-azqnkadbbq

  • MD5

    ea914f2309b04f7a061e41cccaa95b20

  • SHA1

    d251f0ed55f5bcf928d5290e80d2551bc267a47c

  • SHA256

    2844e85a36a29a037eaf1273133b7a83f65c6db637443568703f0052dc7cb1c6

  • SHA512

    72129505f858d29bfe3751a1023a6618e2c22665d190dec7c3f89d81a7aa829a2837c32dd5959f92dbe2349d761521b73be2ec1480a14393b69d0f421582f03e

Malware Config

Targets

    • Target

      2844e85a36a29a037eaf1273133b7a83f65c6db637443568703f0052dc7cb1c6

    • Size

      4.0MB

    • MD5

      ea914f2309b04f7a061e41cccaa95b20

    • SHA1

      d251f0ed55f5bcf928d5290e80d2551bc267a47c

    • SHA256

      2844e85a36a29a037eaf1273133b7a83f65c6db637443568703f0052dc7cb1c6

    • SHA512

      72129505f858d29bfe3751a1023a6618e2c22665d190dec7c3f89d81a7aa829a2837c32dd5959f92dbe2349d761521b73be2ec1480a14393b69d0f421582f03e

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks