General

  • Target

    198fc6f47500e46e8b13643d5b864e1ef47172938bcaf1adcfee28f4a533f3f2

  • Size

    4.0MB

  • Sample

    220830-brmglsagd6

  • MD5

    93942fd739c744daebe518ada6e99c9b

  • SHA1

    b71a8d1864ec77eae953169d113c150338a8b513

  • SHA256

    198fc6f47500e46e8b13643d5b864e1ef47172938bcaf1adcfee28f4a533f3f2

  • SHA512

    ec27e79a944983fa735d05c3ce3184fbc3c1461bcb3d564727f3ff59a47bf460cd8664c3fa42bdc82ab0c88b7bf7d5a60f8943fe0cd3ae7d613e8f9c5d2a0329

  • SSDEEP

    98304:n8aL/C3gfhc6pRN6OnFoVef04DI45mZJwMPj8DMMBkIwxXsC:nDLkgFReeXDIVhYoMBkIWXsC

Malware Config

Targets

    • Target

      198fc6f47500e46e8b13643d5b864e1ef47172938bcaf1adcfee28f4a533f3f2

    • Size

      4.0MB

    • MD5

      93942fd739c744daebe518ada6e99c9b

    • SHA1

      b71a8d1864ec77eae953169d113c150338a8b513

    • SHA256

      198fc6f47500e46e8b13643d5b864e1ef47172938bcaf1adcfee28f4a533f3f2

    • SHA512

      ec27e79a944983fa735d05c3ce3184fbc3c1461bcb3d564727f3ff59a47bf460cd8664c3fa42bdc82ab0c88b7bf7d5a60f8943fe0cd3ae7d613e8f9c5d2a0329

    • SSDEEP

      98304:n8aL/C3gfhc6pRN6OnFoVef04DI45mZJwMPj8DMMBkIwxXsC:nDLkgFReeXDIVhYoMBkIWXsC

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks