General

  • Target

    162167cc828134b6c0d08d5fc503955b4ee1a0a3efdc001709a6947be15ed3bd

  • Size

    4.0MB

  • Sample

    220822-vycersdgh4

  • MD5

    a9103ecc6cb83874f969456e129799a1

  • SHA1

    869b755bd85562cbb0ee028dacf8683ea4d0e492

  • SHA256

    162167cc828134b6c0d08d5fc503955b4ee1a0a3efdc001709a6947be15ed3bd

  • SHA512

    22bfe40773d1f4d8ea475885a9fc33462121ca836a93e544c5be4119ede97ce8cbba929a1c85afcbff79b5dfe6f45dbc71d8e43d6680d9c1c99008a1119e06ab

  • SSDEEP

    98304:8jiyG7kzffaYEXdMIYFdC6Zfl4XKhE8dO5iJYpEEQego8m8:AiyRzfSX5Du9eKhOpgegf

Malware Config

Targets

    • Target

      162167cc828134b6c0d08d5fc503955b4ee1a0a3efdc001709a6947be15ed3bd

    • Size

      4.0MB

    • MD5

      a9103ecc6cb83874f969456e129799a1

    • SHA1

      869b755bd85562cbb0ee028dacf8683ea4d0e492

    • SHA256

      162167cc828134b6c0d08d5fc503955b4ee1a0a3efdc001709a6947be15ed3bd

    • SHA512

      22bfe40773d1f4d8ea475885a9fc33462121ca836a93e544c5be4119ede97ce8cbba929a1c85afcbff79b5dfe6f45dbc71d8e43d6680d9c1c99008a1119e06ab

    • SSDEEP

      98304:8jiyG7kzffaYEXdMIYFdC6Zfl4XKhE8dO5iJYpEEQego8m8:AiyRzfSX5Du9eKhOpgegf

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks