General

  • Target

    21b6a232352dfe2f9f60f637bb094e89aefed0df256ee2bd38d44a1656a8b25a

  • Size

    4.0MB

  • Sample

    220830-bskz6sagf2

  • MD5

    96f89116ae83fac84d6668d9b11e2eb4

  • SHA1

    bd5ffce09545bd008499ce9b9eeb2711b61d50f7

  • SHA256

    21b6a232352dfe2f9f60f637bb094e89aefed0df256ee2bd38d44a1656a8b25a

  • SHA512

    899d3b32fc7d66ee5e8368e87f8d449d6a5cabff9afb9f1ea0bea4343bb5cfa17633749d7437fd18ea6f057cc0f78b9e1642625f5a7644f4fae55a063b5043e1

  • SSDEEP

    98304:+VEyq98sCzOXG4G2KnUKcqUEx47uCQ10KkzTu+ZZIPHnTB:yq98nOW4G2QbcqLx11rsZIfnd

Malware Config

Targets

    • Target

      21b6a232352dfe2f9f60f637bb094e89aefed0df256ee2bd38d44a1656a8b25a

    • Size

      4.0MB

    • MD5

      96f89116ae83fac84d6668d9b11e2eb4

    • SHA1

      bd5ffce09545bd008499ce9b9eeb2711b61d50f7

    • SHA256

      21b6a232352dfe2f9f60f637bb094e89aefed0df256ee2bd38d44a1656a8b25a

    • SHA512

      899d3b32fc7d66ee5e8368e87f8d449d6a5cabff9afb9f1ea0bea4343bb5cfa17633749d7437fd18ea6f057cc0f78b9e1642625f5a7644f4fae55a063b5043e1

    • SSDEEP

      98304:+VEyq98sCzOXG4G2KnUKcqUEx47uCQ10KkzTu+ZZIPHnTB:yq98nOW4G2QbcqLx11rsZIfnd

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks