General

  • Target

    A7A0AF99F5B4ED92F74ABDD2B8FAFFD270A821DCE3AB8EC164D6D17DD46D2BE0

  • Size

    4.0MB

  • Sample

    220812-hx28ksabbm

  • MD5

    657879c2babd84a404ce7429cc867ce1

  • SHA1

    0e22e3303cf80847335257647467149cafd84f72

  • SHA256

    a7a0af99f5b4ed92f74abdd2b8faffd270a821dce3ab8ec164d6d17dd46d2be0

  • SHA512

    e5bd207e533440a23dec2351cd24a4bcc52325cf9b101c15cec7f2d935450b740097640cdb0fc5191e10b40d4f6437a8b5e0e87361bc5c22eb19f4eae76fd8f0

Malware Config

Targets

    • Target

      A7A0AF99F5B4ED92F74ABDD2B8FAFFD270A821DCE3AB8EC164D6D17DD46D2BE0

    • Size

      4.0MB

    • MD5

      657879c2babd84a404ce7429cc867ce1

    • SHA1

      0e22e3303cf80847335257647467149cafd84f72

    • SHA256

      a7a0af99f5b4ed92f74abdd2b8faffd270a821dce3ab8ec164d6d17dd46d2be0

    • SHA512

      e5bd207e533440a23dec2351cd24a4bcc52325cf9b101c15cec7f2d935450b740097640cdb0fc5191e10b40d4f6437a8b5e0e87361bc5c22eb19f4eae76fd8f0

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks