General

  • Target

    2d3e9420c47dee79a05feb09067fd4ee602f5739d2b742a77385586e40c8b6cc

  • Size

    4.0MB

  • Sample

    220813-164rwaegcl

  • MD5

    789f04871acbe502515765238fc53d64

  • SHA1

    9e2546dd0c9922cc1f11e2b9e72e89b66a74373b

  • SHA256

    2d3e9420c47dee79a05feb09067fd4ee602f5739d2b742a77385586e40c8b6cc

  • SHA512

    061ea32c791a1917bca0fadd303d930e2ca537c1339471a6e2a2b5b35c15ef7bf4e77d6e6fcb51bceb5646cffaa7f7bb6697ae4804ef8bc8300b857efacb1c18

Malware Config

Targets

    • Target

      2d3e9420c47dee79a05feb09067fd4ee602f5739d2b742a77385586e40c8b6cc

    • Size

      4.0MB

    • MD5

      789f04871acbe502515765238fc53d64

    • SHA1

      9e2546dd0c9922cc1f11e2b9e72e89b66a74373b

    • SHA256

      2d3e9420c47dee79a05feb09067fd4ee602f5739d2b742a77385586e40c8b6cc

    • SHA512

      061ea32c791a1917bca0fadd303d930e2ca537c1339471a6e2a2b5b35c15ef7bf4e77d6e6fcb51bceb5646cffaa7f7bb6697ae4804ef8bc8300b857efacb1c18

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks