General

  • Target

    cf69dfc3fe68b55656f7851286256c1518a96cc57fa0edbc1e6362a3195ecba6

  • Size

    174KB

  • Sample

    220805-z826dshdh4

  • MD5

    81305c1d38dac02e66a7eeb2c652614e

  • SHA1

    5937f3039aa6ad0ad4bbd1f1d539c675fe3a8c4d

  • SHA256

    cf69dfc3fe68b55656f7851286256c1518a96cc57fa0edbc1e6362a3195ecba6

  • SHA512

    494ba874dd1e7db7008ddf619260fab6c1d9714341136a3bd5231d5e5cf191f484103ab1c0c2ac00492235e16fb5f5e4bc844c3de086d52aaea6616262e45e72

Malware Config

Targets

    • Target

      cf69dfc3fe68b55656f7851286256c1518a96cc57fa0edbc1e6362a3195ecba6

    • Size

      174KB

    • MD5

      81305c1d38dac02e66a7eeb2c652614e

    • SHA1

      5937f3039aa6ad0ad4bbd1f1d539c675fe3a8c4d

    • SHA256

      cf69dfc3fe68b55656f7851286256c1518a96cc57fa0edbc1e6362a3195ecba6

    • SHA512

      494ba874dd1e7db7008ddf619260fab6c1d9714341136a3bd5231d5e5cf191f484103ab1c0c2ac00492235e16fb5f5e4bc844c3de086d52aaea6616262e45e72

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks