General

  • Target

    1FD0C0264A04B86FE176DF685B3E20D0CAED5553BF01341CDEDDF78E12BEB212

  • Size

    4.0MB

  • Sample

    220812-hp9mpahhhk

  • MD5

    6450ec52b7be89e6cd6c00f40da86d13

  • SHA1

    68ef838e84576868ba5a32606e19e3b02c7e9842

  • SHA256

    1fd0c0264a04b86fe176df685b3e20d0caed5553bf01341cdeddf78e12beb212

  • SHA512

    ade9670a146970ed6d9455c778baf8c34329da6420192df8f484f4c9ccb9cad8aedef2daf80040799fed4c37155d0b7bc2b2fbfa0f1b54c3f756cba7782aa6ef

Malware Config

Targets

    • Target

      1FD0C0264A04B86FE176DF685B3E20D0CAED5553BF01341CDEDDF78E12BEB212

    • Size

      4.0MB

    • MD5

      6450ec52b7be89e6cd6c00f40da86d13

    • SHA1

      68ef838e84576868ba5a32606e19e3b02c7e9842

    • SHA256

      1fd0c0264a04b86fe176df685b3e20d0caed5553bf01341cdeddf78e12beb212

    • SHA512

      ade9670a146970ed6d9455c778baf8c34329da6420192df8f484f4c9ccb9cad8aedef2daf80040799fed4c37155d0b7bc2b2fbfa0f1b54c3f756cba7782aa6ef

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks