General

  • Target

    45a0ab555680bd5d74472ec1fa7c56092fb2eee5123e35f74b44f807d087e1ef

  • Size

    4.0MB

  • Sample

    220830-b4y16saaaj

  • MD5

    98d436062464b3b15630ba3e0935d919

  • SHA1

    6ba6f6f0ece9507e32cc1a0620253f173f98aa73

  • SHA256

    45a0ab555680bd5d74472ec1fa7c56092fb2eee5123e35f74b44f807d087e1ef

  • SHA512

    1e8cae5ce8f4833c9517749e799f81677208bc98fdcb8890333a4aafd10ebc0580db7b82a2436c23eab06111e13258889051aec7183d4462f179308ef26a0999

  • SSDEEP

    98304:piPfQEDr7CBGZ/j+yhNMWJu4OzzUtuIZqA72M9T2hYN8s:piPfVn/dfMWnOzz2ZFx9ChA8s

Malware Config

Targets

    • Target

      45a0ab555680bd5d74472ec1fa7c56092fb2eee5123e35f74b44f807d087e1ef

    • Size

      4.0MB

    • MD5

      98d436062464b3b15630ba3e0935d919

    • SHA1

      6ba6f6f0ece9507e32cc1a0620253f173f98aa73

    • SHA256

      45a0ab555680bd5d74472ec1fa7c56092fb2eee5123e35f74b44f807d087e1ef

    • SHA512

      1e8cae5ce8f4833c9517749e799f81677208bc98fdcb8890333a4aafd10ebc0580db7b82a2436c23eab06111e13258889051aec7183d4462f179308ef26a0999

    • SSDEEP

      98304:piPfQEDr7CBGZ/j+yhNMWJu4OzzUtuIZqA72M9T2hYN8s:piPfVn/dfMWnOzz2ZFx9ChA8s

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks