General

  • Target

    17cde34f263ecd703e0b94af2a836bf055f5597f3ddc338b3f2bea89fe1f60d5

  • Size

    4.0MB

  • Sample

    220830-bqtvashfgr

  • MD5

    4a9e8f639c64ac99ce0515ae3564297a

  • SHA1

    0e37a04674abea851224bfde8ae2a381119af842

  • SHA256

    17cde34f263ecd703e0b94af2a836bf055f5597f3ddc338b3f2bea89fe1f60d5

  • SHA512

    ed95d7908372bd97ec09c835d83a2e54b4d187102941f79fa99d97f1c02f7f1e28b42aa2d40f1bb4e205cf8f3fd761ad1e487794bfd66718b4b4647428a6605a

  • SSDEEP

    98304:FW0+vo4JCMjoJOmi1yiUEj+eZ9ept+U6NVoyG1WF6MS:U0+v3Dj+eZ964V6vM

Malware Config

Targets

    • Target

      17cde34f263ecd703e0b94af2a836bf055f5597f3ddc338b3f2bea89fe1f60d5

    • Size

      4.0MB

    • MD5

      4a9e8f639c64ac99ce0515ae3564297a

    • SHA1

      0e37a04674abea851224bfde8ae2a381119af842

    • SHA256

      17cde34f263ecd703e0b94af2a836bf055f5597f3ddc338b3f2bea89fe1f60d5

    • SHA512

      ed95d7908372bd97ec09c835d83a2e54b4d187102941f79fa99d97f1c02f7f1e28b42aa2d40f1bb4e205cf8f3fd761ad1e487794bfd66718b4b4647428a6605a

    • SSDEEP

      98304:FW0+vo4JCMjoJOmi1yiUEj+eZ9ept+U6NVoyG1WF6MS:U0+v3Dj+eZ964V6vM

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks