General

  • Target

    71757E1D64BB728520ED8A10CFDB543FA44A5EAB1404662D9D258A25DB9330B6

  • Size

    4.0MB

  • Sample

    220812-hv4cvscfc5

  • MD5

    cf09eef2ebb9d8e4d6b57d46e81ff6cb

  • SHA1

    81685e3eead97d87ff2d44ac8fde73dad0dbea0b

  • SHA256

    71757e1d64bb728520ed8a10cfdb543fa44a5eab1404662d9d258a25db9330b6

  • SHA512

    e666c41ecb8e5f1a113b7fc5817fa0a403a31693cb61ed1cf2477ac1440bb80ec3fce7fa046845887fdb43d6199a2bf62e2c6b040599a8e3630f7f5ce2559562

Malware Config

Targets

    • Target

      71757E1D64BB728520ED8A10CFDB543FA44A5EAB1404662D9D258A25DB9330B6

    • Size

      4.0MB

    • MD5

      cf09eef2ebb9d8e4d6b57d46e81ff6cb

    • SHA1

      81685e3eead97d87ff2d44ac8fde73dad0dbea0b

    • SHA256

      71757e1d64bb728520ed8a10cfdb543fa44a5eab1404662d9d258a25db9330b6

    • SHA512

      e666c41ecb8e5f1a113b7fc5817fa0a403a31693cb61ed1cf2477ac1440bb80ec3fce7fa046845887fdb43d6199a2bf62e2c6b040599a8e3630f7f5ce2559562

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks