General

  • Target

    caaa0d88dcfbd0e017a9b0b6c25cbdddc3e1bf27f2c96608989cd82ca6c47d36

  • Size

    4.0MB

  • Sample

    220822-vx44dsdgh2

  • MD5

    817b1f542e3b5b0d5acc7c2222baffd0

  • SHA1

    fa0181b57c6f2d281cd902582523b3764b8adbf2

  • SHA256

    caaa0d88dcfbd0e017a9b0b6c25cbdddc3e1bf27f2c96608989cd82ca6c47d36

  • SHA512

    bf5840f2965b84004707e857db2f3cc376212b3f14063a35eda1a32f2215c192e5118956ae38464b17374f45c7da84e1a8d8f9ece39dea869f14e81dec40c6e1

  • SSDEEP

    98304:AwceLkllGCHA4wT725bdqs1WJFwT5049SdM2luc7KoQtRo:A0Ylzgx7UdqsmwZ9SdjlR2omRo

Malware Config

Targets

    • Target

      caaa0d88dcfbd0e017a9b0b6c25cbdddc3e1bf27f2c96608989cd82ca6c47d36

    • Size

      4.0MB

    • MD5

      817b1f542e3b5b0d5acc7c2222baffd0

    • SHA1

      fa0181b57c6f2d281cd902582523b3764b8adbf2

    • SHA256

      caaa0d88dcfbd0e017a9b0b6c25cbdddc3e1bf27f2c96608989cd82ca6c47d36

    • SHA512

      bf5840f2965b84004707e857db2f3cc376212b3f14063a35eda1a32f2215c192e5118956ae38464b17374f45c7da84e1a8d8f9ece39dea869f14e81dec40c6e1

    • SSDEEP

      98304:AwceLkllGCHA4wT725bdqs1WJFwT5049SdM2luc7KoQtRo:A0Ylzgx7UdqsmwZ9SdjlR2omRo

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks