General

  • Target

    090C7252A135FC07A76346D91CFC05434B5B3FE72B7EAF40A99AE44F4C0D9058

  • Size

    4.0MB

  • Sample

    220812-hnaf7scdg3

  • MD5

    1185a7ea8363092504eab6f64dbc24e1

  • SHA1

    a02c270b6f424775d25d03d3269f6e2b2fd0da0c

  • SHA256

    090c7252a135fc07a76346d91cfc05434b5b3fe72b7eaf40a99ae44f4c0d9058

  • SHA512

    770f597b00a08edf3dabfcde9aedee45dfbab9de4f28f1076635b6f7af8ab14fa74786af952831ca83b844cbfff847727787f1d12ea0c0cc1dd5c80714dc627c

Malware Config

Targets

    • Target

      090C7252A135FC07A76346D91CFC05434B5B3FE72B7EAF40A99AE44F4C0D9058

    • Size

      4.0MB

    • MD5

      1185a7ea8363092504eab6f64dbc24e1

    • SHA1

      a02c270b6f424775d25d03d3269f6e2b2fd0da0c

    • SHA256

      090c7252a135fc07a76346d91cfc05434b5b3fe72b7eaf40a99ae44f4c0d9058

    • SHA512

      770f597b00a08edf3dabfcde9aedee45dfbab9de4f28f1076635b6f7af8ab14fa74786af952831ca83b844cbfff847727787f1d12ea0c0cc1dd5c80714dc627c

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks