General

  • Target

    99397F1C6FF002C0E52CE8DBCFC6341D2592D8C7A12462ADB0EFC3450CFCD34B

  • Size

    4.0MB

  • Sample

    220812-hxxcbscfe5

  • MD5

    38069d06debf35bab01ffab2d69876b1

  • SHA1

    d475a44c97c07aa79a0a91d93985377217936479

  • SHA256

    99397f1c6ff002c0e52ce8dbcfc6341d2592d8c7a12462adb0efc3450cfcd34b

  • SHA512

    b94d2791a4d5b075dedeab358af12a616b96506df85aa501bc46ce77f939bdd1617aef2023290235fa8228312b60c2ac3f8d4d96e62a3063cfe1dd38ad492686

Malware Config

Targets

    • Target

      99397F1C6FF002C0E52CE8DBCFC6341D2592D8C7A12462ADB0EFC3450CFCD34B

    • Size

      4.0MB

    • MD5

      38069d06debf35bab01ffab2d69876b1

    • SHA1

      d475a44c97c07aa79a0a91d93985377217936479

    • SHA256

      99397f1c6ff002c0e52ce8dbcfc6341d2592d8c7a12462adb0efc3450cfcd34b

    • SHA512

      b94d2791a4d5b075dedeab358af12a616b96506df85aa501bc46ce77f939bdd1617aef2023290235fa8228312b60c2ac3f8d4d96e62a3063cfe1dd38ad492686

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks