General

  • Target

    B3E3F96200503F66168188EE1B36A201450AF2C6925ACA2295997EE0F554AB8E

  • Size

    4.0MB

  • Sample

    220812-hyylsacff2

  • MD5

    cb2eed05de49399f878bdf00f4b53ee6

  • SHA1

    1602c42b6b3ef4f9e91550af2d69f1d1b7e51354

  • SHA256

    b3e3f96200503f66168188ee1b36a201450af2c6925aca2295997ee0f554ab8e

  • SHA512

    9df04aade3b16995ac4abb033410a58253d34efa96893bcc0faaf2a66ac32d8539d7a0522d1478d6cd7447bfe1ccd9f14a4c0bf394c5acaafbb4ecccf74b5cbd

Malware Config

Targets

    • Target

      B3E3F96200503F66168188EE1B36A201450AF2C6925ACA2295997EE0F554AB8E

    • Size

      4.0MB

    • MD5

      cb2eed05de49399f878bdf00f4b53ee6

    • SHA1

      1602c42b6b3ef4f9e91550af2d69f1d1b7e51354

    • SHA256

      b3e3f96200503f66168188ee1b36a201450af2c6925aca2295997ee0f554ab8e

    • SHA512

      9df04aade3b16995ac4abb033410a58253d34efa96893bcc0faaf2a66ac32d8539d7a0522d1478d6cd7447bfe1ccd9f14a4c0bf394c5acaafbb4ecccf74b5cbd

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks