General

  • Target

    1897A5A90FF44754425B283A5785C6E7D8C1C840829F9D00B9306A0E224C25DF

  • Size

    4.0MB

  • Sample

    220812-hpk94ahhgp

  • MD5

    946ebbe1aff04d62bc636d0d42cc6fab

  • SHA1

    0b7f86388a65860e2f43d5760f269b7ec0ae7056

  • SHA256

    1897a5a90ff44754425b283a5785c6e7d8c1c840829f9d00b9306a0e224c25df

  • SHA512

    384ed88301c002abf04586899e587273115c9ea1b4b17e9c5c494cb8aa5b891f3ce1ed31fb05c22e44b2c32ca14f4f678db12525b88f286646d2ade7bc49af75

Malware Config

Targets

    • Target

      1897A5A90FF44754425B283A5785C6E7D8C1C840829F9D00B9306A0E224C25DF

    • Size

      4.0MB

    • MD5

      946ebbe1aff04d62bc636d0d42cc6fab

    • SHA1

      0b7f86388a65860e2f43d5760f269b7ec0ae7056

    • SHA256

      1897a5a90ff44754425b283a5785c6e7d8c1c840829f9d00b9306a0e224c25df

    • SHA512

      384ed88301c002abf04586899e587273115c9ea1b4b17e9c5c494cb8aa5b891f3ce1ed31fb05c22e44b2c32ca14f4f678db12525b88f286646d2ade7bc49af75

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks