General

  • Target

    19fcb9180dac41b26fde9e8bc55cde777a170131adb5075222004d71d33aaecd

  • Size

    4.0MB

  • Sample

    220830-brvg8aagd7

  • MD5

    188a2cf52285fc1de5d6049eb62b2b3a

  • SHA1

    cd36dd0cc3a94cad8c1543fe0ad8dc711733a38b

  • SHA256

    19fcb9180dac41b26fde9e8bc55cde777a170131adb5075222004d71d33aaecd

  • SHA512

    92dc3a3e1017fd9d9be82f193981dc69835584d7724d98ad152cfa315d8670d0b5982ebc4490e336df75f4c48dff82a4a3006ba309e403f15eb713d594c83feb

  • SSDEEP

    98304:ar6lDfi7sPrTJCcfcNJU8gTiXLHaRnLfS:/lr5jTJ0NJU4LHatLf

Malware Config

Targets

    • Target

      19fcb9180dac41b26fde9e8bc55cde777a170131adb5075222004d71d33aaecd

    • Size

      4.0MB

    • MD5

      188a2cf52285fc1de5d6049eb62b2b3a

    • SHA1

      cd36dd0cc3a94cad8c1543fe0ad8dc711733a38b

    • SHA256

      19fcb9180dac41b26fde9e8bc55cde777a170131adb5075222004d71d33aaecd

    • SHA512

      92dc3a3e1017fd9d9be82f193981dc69835584d7724d98ad152cfa315d8670d0b5982ebc4490e336df75f4c48dff82a4a3006ba309e403f15eb713d594c83feb

    • SSDEEP

      98304:ar6lDfi7sPrTJCcfcNJU8gTiXLHaRnLfS:/lr5jTJ0NJU4LHatLf

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks