General

  • Target

    16bc57ee73d22b607e9453e9f5013faac79446db8c6b36ae4d37f5d38dd06a9b

  • Size

    4.0MB

  • Sample

    220830-bpzn6ahffl

  • MD5

    142941e7818b90fb3997f4c21c8157de

  • SHA1

    a495a8da36b3c0df3b093f8f0b2ce46864b51b22

  • SHA256

    16bc57ee73d22b607e9453e9f5013faac79446db8c6b36ae4d37f5d38dd06a9b

  • SHA512

    50fbfae6d97121fcb3722d477bba5ea7349d9de1f72f1d4f49873b0a728cf333146f7ad883ba3de33697b7d3356ba30fec143d646bc1f543f4fd1265cb2f6a51

  • SSDEEP

    98304:4DGCdr6t++/Jfikc1IHBBarBTyQ+FYR10alxg1LGKk:gVa++/JY1cC8v0qLGKk

Malware Config

Targets

    • Target

      16bc57ee73d22b607e9453e9f5013faac79446db8c6b36ae4d37f5d38dd06a9b

    • Size

      4.0MB

    • MD5

      142941e7818b90fb3997f4c21c8157de

    • SHA1

      a495a8da36b3c0df3b093f8f0b2ce46864b51b22

    • SHA256

      16bc57ee73d22b607e9453e9f5013faac79446db8c6b36ae4d37f5d38dd06a9b

    • SHA512

      50fbfae6d97121fcb3722d477bba5ea7349d9de1f72f1d4f49873b0a728cf333146f7ad883ba3de33697b7d3356ba30fec143d646bc1f543f4fd1265cb2f6a51

    • SSDEEP

      98304:4DGCdr6t++/Jfikc1IHBBarBTyQ+FYR10alxg1LGKk:gVa++/JY1cC8v0qLGKk

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks