General

  • Target

    401d2d854900024949753985b2c3d51004096a7e7a3975451053b408d823dc3c

  • Size

    4.0MB

  • Sample

    220830-b4grwshhgr

  • MD5

    b0f52dc12b957e377e7eb3083d2b0c47

  • SHA1

    1193f17eed4de0a5ee72b8d0cb19285abfded48e

  • SHA256

    401d2d854900024949753985b2c3d51004096a7e7a3975451053b408d823dc3c

  • SHA512

    30ad2c192acbcdc149a189af4a6e5f970cb321e6e05062c4afa85e1fcc9df8b1341fdf23c77fad675230c6f66ef964662fdf3168443c3673380b27c4ee2a868b

  • SSDEEP

    98304:0R9860abjE0H3ZDpYsoZCVRaOeBF056I8Og1u84D+xFUv7NCE:a02jfDpYsoZwRHh+4oUv7N

Malware Config

Targets

    • Target

      401d2d854900024949753985b2c3d51004096a7e7a3975451053b408d823dc3c

    • Size

      4.0MB

    • MD5

      b0f52dc12b957e377e7eb3083d2b0c47

    • SHA1

      1193f17eed4de0a5ee72b8d0cb19285abfded48e

    • SHA256

      401d2d854900024949753985b2c3d51004096a7e7a3975451053b408d823dc3c

    • SHA512

      30ad2c192acbcdc149a189af4a6e5f970cb321e6e05062c4afa85e1fcc9df8b1341fdf23c77fad675230c6f66ef964662fdf3168443c3673380b27c4ee2a868b

    • SSDEEP

      98304:0R9860abjE0H3ZDpYsoZCVRaOeBF056I8Og1u84D+xFUv7NCE:a02jfDpYsoZwRHh+4oUv7N

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks