General

  • Target

    6f77aa386dcd9d24e4cb6ae1f10f779ad105ca6d74405f336b7c8be06742aabc

  • Size

    4.0MB

  • Sample

    220830-cefzqsbbh7

  • MD5

    3c80bb1573592cc5d855e372155009b7

  • SHA1

    c4d9b4f499dbe5ac3d4f4242b01af8bdac01e2e5

  • SHA256

    6f77aa386dcd9d24e4cb6ae1f10f779ad105ca6d74405f336b7c8be06742aabc

  • SHA512

    2964a206bef693e78bdd79b9b6e07a9056ab8caeeb76f2b93e4f1fb977d580f048749b29e4fcce8492f7dd028c23af19bc71ffaee70f52fa616e4754ec94075a

  • SSDEEP

    98304:we+CD9I4tr434FJHN9QYv9P3p2Lss7hKOUMivH7K5ilVlI16o6lC9Tck:we+A9Igrmkp1P3pNoKOumoOvNTc

Malware Config

Targets

    • Target

      6f77aa386dcd9d24e4cb6ae1f10f779ad105ca6d74405f336b7c8be06742aabc

    • Size

      4.0MB

    • MD5

      3c80bb1573592cc5d855e372155009b7

    • SHA1

      c4d9b4f499dbe5ac3d4f4242b01af8bdac01e2e5

    • SHA256

      6f77aa386dcd9d24e4cb6ae1f10f779ad105ca6d74405f336b7c8be06742aabc

    • SHA512

      2964a206bef693e78bdd79b9b6e07a9056ab8caeeb76f2b93e4f1fb977d580f048749b29e4fcce8492f7dd028c23af19bc71ffaee70f52fa616e4754ec94075a

    • SSDEEP

      98304:we+CD9I4tr434FJHN9QYv9P3p2Lss7hKOUMivH7K5ilVlI16o6lC9Tck:we+A9Igrmkp1P3pNoKOumoOvNTc

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks