General

  • Target

    2ced681e3ece2aab547683b77b59ac24b72dda095ab37cd4bdbf7de47d9d356a

  • Size

    4.0MB

  • Sample

    220830-bxs7cahggp

  • MD5

    67891cd60e6fc2e1acbc9fe6dc5ceac9

  • SHA1

    374f5e49e0dccc49d4642b055e8554d23f8446d1

  • SHA256

    2ced681e3ece2aab547683b77b59ac24b72dda095ab37cd4bdbf7de47d9d356a

  • SHA512

    b35da63a7158c33dc13f6144ded2f33f1c83221b8026c05414755fad4d12337e035d9da9f86539c17741451844ddf199d21e3ff046c069ac6e3fbc33b27baf80

  • SSDEEP

    98304:0iJhxBxZCW7B7JEcwCH04CZ9KUafpW3BpCTd:08h/xcWtJEcw9/KpfpW3XCT

Malware Config

Targets

    • Target

      2ced681e3ece2aab547683b77b59ac24b72dda095ab37cd4bdbf7de47d9d356a

    • Size

      4.0MB

    • MD5

      67891cd60e6fc2e1acbc9fe6dc5ceac9

    • SHA1

      374f5e49e0dccc49d4642b055e8554d23f8446d1

    • SHA256

      2ced681e3ece2aab547683b77b59ac24b72dda095ab37cd4bdbf7de47d9d356a

    • SHA512

      b35da63a7158c33dc13f6144ded2f33f1c83221b8026c05414755fad4d12337e035d9da9f86539c17741451844ddf199d21e3ff046c069ac6e3fbc33b27baf80

    • SSDEEP

      98304:0iJhxBxZCW7B7JEcwCH04CZ9KUafpW3BpCTd:08h/xcWtJEcw9/KpfpW3XCT

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks