General

  • Target

    2e75d02b11edbe64ec8f09baa95ca26b994e4d3cdf8797829ad7badba0930e29

  • Size

    4.0MB

  • Sample

    220830-byltnahhal

  • MD5

    945b70c2789c1bface3d2dacd082e276

  • SHA1

    29bef81d193e553205a2879ff6e0507190cc84fe

  • SHA256

    2e75d02b11edbe64ec8f09baa95ca26b994e4d3cdf8797829ad7badba0930e29

  • SHA512

    2564aa8eace85edee22e14547c9dc5ea11f320728b30e178be8e7b780ddd9e354f18f9534670eb15d00f91ed9318ae76621fec149eeca25c806afb20d5858d76

  • SSDEEP

    98304:F034SaW1x8oC2Y5vJFiQBa323NXGimR15mzE49HV2S1:F034goNTF423NXPZ4MHV2

Malware Config

Targets

    • Target

      2e75d02b11edbe64ec8f09baa95ca26b994e4d3cdf8797829ad7badba0930e29

    • Size

      4.0MB

    • MD5

      945b70c2789c1bface3d2dacd082e276

    • SHA1

      29bef81d193e553205a2879ff6e0507190cc84fe

    • SHA256

      2e75d02b11edbe64ec8f09baa95ca26b994e4d3cdf8797829ad7badba0930e29

    • SHA512

      2564aa8eace85edee22e14547c9dc5ea11f320728b30e178be8e7b780ddd9e354f18f9534670eb15d00f91ed9318ae76621fec149eeca25c806afb20d5858d76

    • SSDEEP

      98304:F034SaW1x8oC2Y5vJFiQBa323NXGimR15mzE49HV2S1:F034goNTF423NXPZ4MHV2

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks