General

  • Target

    69cba225ed4d14a6465dbded19c12e9b4e0f383d37c2344299ceab609e6ccdba

  • Size

    4.0MB

  • Sample

    220830-cccjjabbe6

  • MD5

    e86316a486464ddcedc758fa87728e77

  • SHA1

    4809d89e594ae4e7ec6734ac36d5e928bc998183

  • SHA256

    69cba225ed4d14a6465dbded19c12e9b4e0f383d37c2344299ceab609e6ccdba

  • SHA512

    15bed949150a3c19a9b4aee6665ed063eb6bb79b09ed2232f7c21aa3566e19f0d042170a571e7c8ae42579dc75142bc707a57af4972d8a676d043fe9d2894f74

  • SSDEEP

    98304:VYP+MwExzjqwA+V04FsIhMupCKaIo4E6UXKNv8qsCwI:GP3ZMwVnsImYpal4EasCw

Malware Config

Targets

    • Target

      69cba225ed4d14a6465dbded19c12e9b4e0f383d37c2344299ceab609e6ccdba

    • Size

      4.0MB

    • MD5

      e86316a486464ddcedc758fa87728e77

    • SHA1

      4809d89e594ae4e7ec6734ac36d5e928bc998183

    • SHA256

      69cba225ed4d14a6465dbded19c12e9b4e0f383d37c2344299ceab609e6ccdba

    • SHA512

      15bed949150a3c19a9b4aee6665ed063eb6bb79b09ed2232f7c21aa3566e19f0d042170a571e7c8ae42579dc75142bc707a57af4972d8a676d043fe9d2894f74

    • SSDEEP

      98304:VYP+MwExzjqwA+V04FsIhMupCKaIo4E6UXKNv8qsCwI:GP3ZMwVnsImYpal4EasCw

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks