General

  • Target

    C2430B3647C4AEA8A5FDB33491FE15EE3B894A9B246630296A879FCCBC8B2325

  • Size

    4.0MB

  • Sample

    220812-hzgpnacff5

  • MD5

    2fe38a32824c3827fcbeaaeb3684450c

  • SHA1

    ec442cab70febb084e07a8f0ca4c31946eef6594

  • SHA256

    c2430b3647c4aea8a5fdb33491fe15ee3b894a9b246630296a879fccbc8b2325

  • SHA512

    f5c510853ac8a4d9b7966bfdb3b85cdc5a72c28811333ad64c214529da2ffb14650b392f323f74676671e7b8529c064563aebee2d6dc71e2ce57239df76d4a0c

Malware Config

Targets

    • Target

      C2430B3647C4AEA8A5FDB33491FE15EE3B894A9B246630296A879FCCBC8B2325

    • Size

      4.0MB

    • MD5

      2fe38a32824c3827fcbeaaeb3684450c

    • SHA1

      ec442cab70febb084e07a8f0ca4c31946eef6594

    • SHA256

      c2430b3647c4aea8a5fdb33491fe15ee3b894a9b246630296a879fccbc8b2325

    • SHA512

      f5c510853ac8a4d9b7966bfdb3b85cdc5a72c28811333ad64c214529da2ffb14650b392f323f74676671e7b8529c064563aebee2d6dc71e2ce57239df76d4a0c

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks