General

  • Target

    6c7f88e55c57084e53170b71776508a57ebc129349a82a264c0981b299749b9c

  • Size

    4.0MB

  • Sample

    220830-cc6glsabfp

  • MD5

    1a2a40d7b4da9d7d63bed8ca312c0e5b

  • SHA1

    f88167a46e6451842046150b3d22fee125d0f409

  • SHA256

    6c7f88e55c57084e53170b71776508a57ebc129349a82a264c0981b299749b9c

  • SHA512

    32930088e7e213d5a3da0c5b9d452faa461fb17642e2ec369ccaf9a055bc2c362f18af4cd1286718349f0c900941d3536acfa2a837d09c4b01d75ba1e8333958

  • SSDEEP

    49152:k8tFZBAwgaj8VOtlJEyig0O/HPVe98W/u7luCSX+jVav9sqbpemO8FKX+i5m6qs1:nFPgajoqlF0OPPVTWLL+jY1PQv8V1Hl

Malware Config

Targets

    • Target

      6c7f88e55c57084e53170b71776508a57ebc129349a82a264c0981b299749b9c

    • Size

      4.0MB

    • MD5

      1a2a40d7b4da9d7d63bed8ca312c0e5b

    • SHA1

      f88167a46e6451842046150b3d22fee125d0f409

    • SHA256

      6c7f88e55c57084e53170b71776508a57ebc129349a82a264c0981b299749b9c

    • SHA512

      32930088e7e213d5a3da0c5b9d452faa461fb17642e2ec369ccaf9a055bc2c362f18af4cd1286718349f0c900941d3536acfa2a837d09c4b01d75ba1e8333958

    • SSDEEP

      49152:k8tFZBAwgaj8VOtlJEyig0O/HPVe98W/u7luCSX+jVav9sqbpemO8FKX+i5m6qs1:nFPgajoqlF0OPPVTWLL+jY1PQv8V1Hl

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks