General

  • Target

    839f7c1eff77ede1cfb0698e4c1ac04ecd201d2fab2db25668cc711eff551458

  • Size

    4.0MB

  • Sample

    220814-17m6hsdgd9

  • MD5

    90959601fac910020d86ec5a2f8d39f6

  • SHA1

    3b21d9428979b79fa319839ee0225991e922a110

  • SHA256

    839f7c1eff77ede1cfb0698e4c1ac04ecd201d2fab2db25668cc711eff551458

  • SHA512

    f3aa6853b0c105c106a4295fa213b942fd37add8fa44a96c82a2243f163ac4c42cd210f30fe944d675568665b6172fd8c83cb4fffeaebc1e715f8bdfb13b72d8

Malware Config

Targets

    • Target

      839f7c1eff77ede1cfb0698e4c1ac04ecd201d2fab2db25668cc711eff551458

    • Size

      4.0MB

    • MD5

      90959601fac910020d86ec5a2f8d39f6

    • SHA1

      3b21d9428979b79fa319839ee0225991e922a110

    • SHA256

      839f7c1eff77ede1cfb0698e4c1ac04ecd201d2fab2db25668cc711eff551458

    • SHA512

      f3aa6853b0c105c106a4295fa213b942fd37add8fa44a96c82a2243f163ac4c42cd210f30fe944d675568665b6172fd8c83cb4fffeaebc1e715f8bdfb13b72d8

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks