General

  • Target

    file

  • Size

    4.0MB

  • Sample

    220823-rsz24afcdq

  • MD5

    dbdabe272ad89931f5b26ccf4c5ef13a

  • SHA1

    a1fa77240cb17b2eda490487de1f45c7f4f4494f

  • SHA256

    2537af94a4828edf5b859e4af8ddad46d740b317e7812c30f7402ac55f64f2e9

  • SHA512

    2a497a39ee5dec27af691a848efe6cb33dbc8efd63fa91b9f552dd9eb5b638c81aee5d39f234df35cc5507f6b6810a8938e90c3ff60ee27d8adbc308cda6cf7f

  • SSDEEP

    98304:u/I3jX6m/pmTq8V0hXDPFofiKfA7MHylLL/El+NU:u/SjXxZ8V0lFbKfA7PlHE8N

Malware Config

Targets

    • Target

      file

    • Size

      4.0MB

    • MD5

      dbdabe272ad89931f5b26ccf4c5ef13a

    • SHA1

      a1fa77240cb17b2eda490487de1f45c7f4f4494f

    • SHA256

      2537af94a4828edf5b859e4af8ddad46d740b317e7812c30f7402ac55f64f2e9

    • SHA512

      2a497a39ee5dec27af691a848efe6cb33dbc8efd63fa91b9f552dd9eb5b638c81aee5d39f234df35cc5507f6b6810a8938e90c3ff60ee27d8adbc308cda6cf7f

    • SSDEEP

      98304:u/I3jX6m/pmTq8V0hXDPFofiKfA7MHylLL/El+NU:u/SjXxZ8V0lFbKfA7PlHE8N

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks