General

  • Target

    30E5D30CFC17F5C85FF99ABCE4C5C3E3B026FD01DDFAEF8DC8DFB02B9C9D8384

  • Size

    4.0MB

  • Sample

    220812-hqz5msced4

  • MD5

    c5ca08bcb25c45ea0f92839b22e37b15

  • SHA1

    4202c1332aae996f4efa560315dd75588d425e2e

  • SHA256

    30e5d30cfc17f5c85ff99abce4c5c3e3b026fd01ddfaef8dc8dfb02b9c9d8384

  • SHA512

    081d63dfdab6f45fb91a4851ee81ed55f0368d50c5b1879864d55cc3239c7fa8afe11f10fc5932ebe25b8c19c6d385c03806a93129264c8a193df0f41d97d654

Malware Config

Targets

    • Target

      30E5D30CFC17F5C85FF99ABCE4C5C3E3B026FD01DDFAEF8DC8DFB02B9C9D8384

    • Size

      4.0MB

    • MD5

      c5ca08bcb25c45ea0f92839b22e37b15

    • SHA1

      4202c1332aae996f4efa560315dd75588d425e2e

    • SHA256

      30e5d30cfc17f5c85ff99abce4c5c3e3b026fd01ddfaef8dc8dfb02b9c9d8384

    • SHA512

      081d63dfdab6f45fb91a4851ee81ed55f0368d50c5b1879864d55cc3239c7fa8afe11f10fc5932ebe25b8c19c6d385c03806a93129264c8a193df0f41d97d654

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks