General

  • Target

    6db5eb3d1d261624b6d27741641dea379653b3a3439db34858d83447eb88033e

  • Size

    4.0MB

  • Sample

    220830-cd6h1abbh5

  • MD5

    513bf71bf90ad5d2dcb89a45f8fb1751

  • SHA1

    2fe88ed7c6d32008a1377cdc6391a41077155d4c

  • SHA256

    6db5eb3d1d261624b6d27741641dea379653b3a3439db34858d83447eb88033e

  • SHA512

    5035d554b60e85d1ea43f0b21dddceadfcb78927a5ab6872aad2ebb7bf2bb0c90f234fb23209f3575f331fe9cd8af6d69cb0b3ce68132d2b10ff94f6c1ec51fb

  • SSDEEP

    98304:GKxJd9dqshZXEYIRpYzHvQorgjOIY/Gr79YX6fArkS:GKxJdC9lQzRg6IMG79y

Malware Config

Targets

    • Target

      6db5eb3d1d261624b6d27741641dea379653b3a3439db34858d83447eb88033e

    • Size

      4.0MB

    • MD5

      513bf71bf90ad5d2dcb89a45f8fb1751

    • SHA1

      2fe88ed7c6d32008a1377cdc6391a41077155d4c

    • SHA256

      6db5eb3d1d261624b6d27741641dea379653b3a3439db34858d83447eb88033e

    • SHA512

      5035d554b60e85d1ea43f0b21dddceadfcb78927a5ab6872aad2ebb7bf2bb0c90f234fb23209f3575f331fe9cd8af6d69cb0b3ce68132d2b10ff94f6c1ec51fb

    • SSDEEP

      98304:GKxJd9dqshZXEYIRpYzHvQorgjOIY/Gr79YX6fArkS:GKxJdC9lQzRg6IMG79y

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks