General

  • Target

    S.exe

  • Size

    4.0MB

  • Sample

    220824-gv83nsada7

  • MD5

    1154ca08233e826ca715aa080f246a43

  • SHA1

    49dcf857ffbd20d21e7ba04ea734699561e69e8d

  • SHA256

    8eec8c9e14777c879507607742c599737722098f5b716efc20e9030e294e29e8

  • SHA512

    5292bd74823b4829d28ad09b9ca688dda843e83641a0f96a808ae5c718549865ea7e8a620bb7616d4f4af6cfaa04254662d8759aa102c2ed9d059a3375c836d8

  • SSDEEP

    49152:7CUPJ8ZQgynXLExYwralpztdNZgpiMM96Koh0G6HKBmhdf5GC9ckudUeb4MoiMXB:7CUP9gyna8yt+4Cx3GC9cksUe9oFR

Malware Config

Targets

    • Target

      S.exe

    • Size

      4.0MB

    • MD5

      1154ca08233e826ca715aa080f246a43

    • SHA1

      49dcf857ffbd20d21e7ba04ea734699561e69e8d

    • SHA256

      8eec8c9e14777c879507607742c599737722098f5b716efc20e9030e294e29e8

    • SHA512

      5292bd74823b4829d28ad09b9ca688dda843e83641a0f96a808ae5c718549865ea7e8a620bb7616d4f4af6cfaa04254662d8759aa102c2ed9d059a3375c836d8

    • SSDEEP

      49152:7CUPJ8ZQgynXLExYwralpztdNZgpiMM96Koh0G6HKBmhdf5GC9ckudUeb4MoiMXB:7CUP9gyna8yt+4Cx3GC9cksUe9oFR

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks