General

  • Target

    357AE268FB3CA9079A3CC844DBB07088D6C4EB8EF18DE7C5E974D8BEAD1CB996

  • Size

    4.0MB

  • Sample

    220812-hq9dbaaabr

  • MD5

    e3bd38237b5a50a15c2163135aeb4311

  • SHA1

    6e206e1a3dda12e7c10806b06f38e13ed2a10aa3

  • SHA256

    357ae268fb3ca9079a3cc844dbb07088d6c4eb8ef18de7c5e974d8bead1cb996

  • SHA512

    549bd4aa1ec91a9e8f808c47c33c94a8539bb3e1274d1fd6b19534d6fe31a685af86b5273d17792e492cc8c8fa4c740bd1afb15558dda781c4e0d1323e8fbb79

Malware Config

Targets

    • Target

      357AE268FB3CA9079A3CC844DBB07088D6C4EB8EF18DE7C5E974D8BEAD1CB996

    • Size

      4.0MB

    • MD5

      e3bd38237b5a50a15c2163135aeb4311

    • SHA1

      6e206e1a3dda12e7c10806b06f38e13ed2a10aa3

    • SHA256

      357ae268fb3ca9079a3cc844dbb07088d6c4eb8ef18de7c5e974d8bead1cb996

    • SHA512

      549bd4aa1ec91a9e8f808c47c33c94a8539bb3e1274d1fd6b19534d6fe31a685af86b5273d17792e492cc8c8fa4c740bd1afb15558dda781c4e0d1323e8fbb79

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks