General

  • Target

    4e4b837d44e4183046f30ffd78bf32a92851250f8ce12cc1f314c600397075bb

  • Size

    4.0MB

  • Sample

    220830-b6klkabaf6

  • MD5

    bb95e4fc983c8aca5f0dd8d05ecf1d70

  • SHA1

    41abd3f03ec4c5944cb820f432b320611d94aed9

  • SHA256

    4e4b837d44e4183046f30ffd78bf32a92851250f8ce12cc1f314c600397075bb

  • SHA512

    f6a13f1acb62d1d4064d9b090742e713abd6c4f14bdb8d499609255001fc40033cab26d82f8254fd2f4a6429581edcb759b6fb8ed797bd3e9bc89394825d8171

  • SSDEEP

    98304:esaFeKilMjHPQh72wtWi0Amv/8U6bQorIBK0HCE/jsON5tQgcfz:e1FhilMjHPQ1JQi0FH8UUIBK0HbsShcr

Malware Config

Targets

    • Target

      4e4b837d44e4183046f30ffd78bf32a92851250f8ce12cc1f314c600397075bb

    • Size

      4.0MB

    • MD5

      bb95e4fc983c8aca5f0dd8d05ecf1d70

    • SHA1

      41abd3f03ec4c5944cb820f432b320611d94aed9

    • SHA256

      4e4b837d44e4183046f30ffd78bf32a92851250f8ce12cc1f314c600397075bb

    • SHA512

      f6a13f1acb62d1d4064d9b090742e713abd6c4f14bdb8d499609255001fc40033cab26d82f8254fd2f4a6429581edcb759b6fb8ed797bd3e9bc89394825d8171

    • SSDEEP

      98304:esaFeKilMjHPQh72wtWi0Amv/8U6bQorIBK0HCE/jsON5tQgcfz:e1FhilMjHPQ1JQi0FH8UUIBK0HbsShcr

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks