General

  • Target

    5FDD4B20A3A14E37444235668E7F641E776E76104DB82A17608D6AB283057B63

  • Size

    4.0MB

  • Sample

    220812-htkjcsceh3

  • MD5

    06103d1e931ea83afb5cac974113c513

  • SHA1

    ef70b042a19addb747697ee3270e1723ff988f5c

  • SHA256

    5fdd4b20a3a14e37444235668e7f641e776e76104db82a17608d6ab283057b63

  • SHA512

    f97ea97ef1431baef2372a7499a76a1edd9494ea31d6544b456d77d18120b4fb73dbc494a36f022b13613c4c636beb59cfb23f96a3386e3f39e9be0e14e1060f

Malware Config

Targets

    • Target

      5FDD4B20A3A14E37444235668E7F641E776E76104DB82A17608D6AB283057B63

    • Size

      4.0MB

    • MD5

      06103d1e931ea83afb5cac974113c513

    • SHA1

      ef70b042a19addb747697ee3270e1723ff988f5c

    • SHA256

      5fdd4b20a3a14e37444235668e7f641e776e76104db82a17608d6ab283057b63

    • SHA512

      f97ea97ef1431baef2372a7499a76a1edd9494ea31d6544b456d77d18120b4fb73dbc494a36f022b13613c4c636beb59cfb23f96a3386e3f39e9be0e14e1060f

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks