General

  • Target

    3C6876A6A24BBFDA488C1BEADE7093B3A756AE7417557C66C4A63774EE7C36C4

  • Size

    4.0MB

  • Sample

    220812-hr6ntacef3

  • MD5

    f00167a3289aa84a614d7792111c7c29

  • SHA1

    735340796be409068e27e025eddb3478f9e5bbfe

  • SHA256

    3c6876a6a24bbfda488c1beade7093b3a756ae7417557c66c4a63774ee7c36c4

  • SHA512

    45e04ceafc684f383f1fc8a7e653f68a0a82c22adab02e75bd2e927e20db25973113dcbd8041801c49abb49ce24659e3571da053ccd306f8b3b56fc6d3d83f2d

Malware Config

Targets

    • Target

      3C6876A6A24BBFDA488C1BEADE7093B3A756AE7417557C66C4A63774EE7C36C4

    • Size

      4.0MB

    • MD5

      f00167a3289aa84a614d7792111c7c29

    • SHA1

      735340796be409068e27e025eddb3478f9e5bbfe

    • SHA256

      3c6876a6a24bbfda488c1beade7093b3a756ae7417557c66c4a63774ee7c36c4

    • SHA512

      45e04ceafc684f383f1fc8a7e653f68a0a82c22adab02e75bd2e927e20db25973113dcbd8041801c49abb49ce24659e3571da053ccd306f8b3b56fc6d3d83f2d

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks