General

  • Target

    302c55540381027416867db2a9c20a65b8e34c8546ab9320ee80dd95a1cd5182

  • Size

    4.0MB

  • Sample

    220830-by7q5ahhaq

  • MD5

    71e40bc36e57ca4d0edfffead9a52390

  • SHA1

    905770ed73c04f37be4aa81405b5836bfd345f6a

  • SHA256

    302c55540381027416867db2a9c20a65b8e34c8546ab9320ee80dd95a1cd5182

  • SHA512

    9574c653c0c48618c9cc218b945a7407a9e9de54126f9a1bda3ba01287465eae68f52aeb08cb1848971e9a51f88bd1bc570b4653768b9f1089aefbd0faf73918

  • SSDEEP

    49152:aQT2E8/3wqE/kW3ltEJm1PGPb2vMhLd25lIINpVw8EUUyd0mHAPOQdvJ3IvQkpkQ:aQT25AqDUtEAUCveA5lIIa3WAPZvrR

Malware Config

Targets

    • Target

      302c55540381027416867db2a9c20a65b8e34c8546ab9320ee80dd95a1cd5182

    • Size

      4.0MB

    • MD5

      71e40bc36e57ca4d0edfffead9a52390

    • SHA1

      905770ed73c04f37be4aa81405b5836bfd345f6a

    • SHA256

      302c55540381027416867db2a9c20a65b8e34c8546ab9320ee80dd95a1cd5182

    • SHA512

      9574c653c0c48618c9cc218b945a7407a9e9de54126f9a1bda3ba01287465eae68f52aeb08cb1848971e9a51f88bd1bc570b4653768b9f1089aefbd0faf73918

    • SSDEEP

      49152:aQT2E8/3wqE/kW3ltEJm1PGPb2vMhLd25lIINpVw8EUUyd0mHAPOQdvJ3IvQkpkQ:aQT25AqDUtEAUCveA5lIIa3WAPZvrR

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks