General

  • Target

    D66C835FFCE7413ED28D1252C814787083AAB6FCDC20DF38120B5DA13991F9C3

  • Size

    4.0MB

  • Sample

    220812-h2svpsacan

  • MD5

    808d028a359d6ff9668e4881fdb28042

  • SHA1

    1fec4d3e24d6e54d24b0d716afa7e6435cd92f37

  • SHA256

    d66c835ffce7413ed28d1252c814787083aab6fcdc20df38120b5da13991f9c3

  • SHA512

    b829c4ab50c5fb0b763b7f8059f062ceec19b78d2f72999cc3876fd038b1249df256a243e661070a5cc047267b5df711d03dc8f959ba1fa56fe6435d86a031e3

Malware Config

Targets

    • Target

      D66C835FFCE7413ED28D1252C814787083AAB6FCDC20DF38120B5DA13991F9C3

    • Size

      4.0MB

    • MD5

      808d028a359d6ff9668e4881fdb28042

    • SHA1

      1fec4d3e24d6e54d24b0d716afa7e6435cd92f37

    • SHA256

      d66c835ffce7413ed28d1252c814787083aab6fcdc20df38120b5da13991f9c3

    • SHA512

      b829c4ab50c5fb0b763b7f8059f062ceec19b78d2f72999cc3876fd038b1249df256a243e661070a5cc047267b5df711d03dc8f959ba1fa56fe6435d86a031e3

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks