General

  • Target

    6ad8bc7136105d471a876539af977d451f772d9d2c1a301e1866907c9458d28d

  • Size

    4.0MB

  • Sample

    220830-cctg2sabep

  • MD5

    8648d46565f4833d9371229608283074

  • SHA1

    434fc1302821ad46941d01981ec7c47b509250ef

  • SHA256

    6ad8bc7136105d471a876539af977d451f772d9d2c1a301e1866907c9458d28d

  • SHA512

    4a3c95fd78347bfd39fd235452fa3e8b54d6b25fc9f20c94d802c3d0844e558a6023c889d2003d445e8bf518424ef7720bc5a712b7b1ed469bfa48556bef2de8

  • SSDEEP

    98304:PuMPstYmbe+0YhlsuTcUhRSkN8bSpAr40ZzdP4q5qLdFe:n2D0MlcUhRSk+Zr405dQOqI

Malware Config

Targets

    • Target

      6ad8bc7136105d471a876539af977d451f772d9d2c1a301e1866907c9458d28d

    • Size

      4.0MB

    • MD5

      8648d46565f4833d9371229608283074

    • SHA1

      434fc1302821ad46941d01981ec7c47b509250ef

    • SHA256

      6ad8bc7136105d471a876539af977d451f772d9d2c1a301e1866907c9458d28d

    • SHA512

      4a3c95fd78347bfd39fd235452fa3e8b54d6b25fc9f20c94d802c3d0844e558a6023c889d2003d445e8bf518424ef7720bc5a712b7b1ed469bfa48556bef2de8

    • SSDEEP

      98304:PuMPstYmbe+0YhlsuTcUhRSkN8bSpAr40ZzdP4q5qLdFe:n2D0MlcUhRSk+Zr405dQOqI

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks