General

  • Target

    29f9205c7063e4206620ec4b0477ad552f13ed4bf09f8eb4ee5297105d78eecf

  • Size

    4.0MB

  • Sample

    220830-bwgrxsaha9

  • MD5

    431ece593025bf4be297ace05f048d11

  • SHA1

    35d89fc6d5f2b2cb413dc0a08ed52859914c2b49

  • SHA256

    29f9205c7063e4206620ec4b0477ad552f13ed4bf09f8eb4ee5297105d78eecf

  • SHA512

    e4c990fa82d51a7f3795cf9d9244805825c4a8c506bf2f2200bae695883cc7827e0102bc1d46b9d61087ecc5c63b4a406fbf52452fe8ef483459dcbb5fcc9a4c

  • SSDEEP

    98304:cJCLs7i0yGKw6DEQbVmI4mbLW9ZhAf0JwTnu5X7nTxZ:cAR0yGX63PV0hnwTnut7Tx

Malware Config

Targets

    • Target

      29f9205c7063e4206620ec4b0477ad552f13ed4bf09f8eb4ee5297105d78eecf

    • Size

      4.0MB

    • MD5

      431ece593025bf4be297ace05f048d11

    • SHA1

      35d89fc6d5f2b2cb413dc0a08ed52859914c2b49

    • SHA256

      29f9205c7063e4206620ec4b0477ad552f13ed4bf09f8eb4ee5297105d78eecf

    • SHA512

      e4c990fa82d51a7f3795cf9d9244805825c4a8c506bf2f2200bae695883cc7827e0102bc1d46b9d61087ecc5c63b4a406fbf52452fe8ef483459dcbb5fcc9a4c

    • SSDEEP

      98304:cJCLs7i0yGKw6DEQbVmI4mbLW9ZhAf0JwTnu5X7nTxZ:cAR0yGX63PV0hnwTnut7Tx

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks