General

  • Target

    6cb421e2a0c187016e243d0bee3bff810cc6d57d760cb14c13a41156224a2398

  • Size

    4.0MB

  • Sample

    220830-cddg8abbg2

  • MD5

    626c9bc075583c1f87e0283f23159f16

  • SHA1

    4f1a331aa8d7bd78313ec9eebdee727d4f560866

  • SHA256

    6cb421e2a0c187016e243d0bee3bff810cc6d57d760cb14c13a41156224a2398

  • SHA512

    49d3f590d0c19526c2bb51dfda53b27c03f5414d47fac4116f6bc4b61f372e6d7327de967f65e17482a13174ba23b7f40db95b4fba1b09166f25a853f8fcc7c2

  • SSDEEP

    98304:T+pPdgBRJHyPGoHTn7pS+OQNJhmZ0G6B36l:C1gB/eknAiZ033

Malware Config

Targets

    • Target

      6cb421e2a0c187016e243d0bee3bff810cc6d57d760cb14c13a41156224a2398

    • Size

      4.0MB

    • MD5

      626c9bc075583c1f87e0283f23159f16

    • SHA1

      4f1a331aa8d7bd78313ec9eebdee727d4f560866

    • SHA256

      6cb421e2a0c187016e243d0bee3bff810cc6d57d760cb14c13a41156224a2398

    • SHA512

      49d3f590d0c19526c2bb51dfda53b27c03f5414d47fac4116f6bc4b61f372e6d7327de967f65e17482a13174ba23b7f40db95b4fba1b09166f25a853f8fcc7c2

    • SSDEEP

      98304:T+pPdgBRJHyPGoHTn7pS+OQNJhmZ0G6B36l:C1gB/eknAiZ033

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks