General

  • Target

    7232f4353c71d5937cac64600fc01804f354603b5d1086921cfda57b0649a1de

  • Size

    4.0MB

  • Sample

    220830-cff15abcb6

  • MD5

    9b38f8f3b26a75b6e13b73a366b61abb

  • SHA1

    cc748fb9e5816df5b6e4e5f307bb7b60989c1f9b

  • SHA256

    7232f4353c71d5937cac64600fc01804f354603b5d1086921cfda57b0649a1de

  • SHA512

    0d15e67c0c07bfe25e41ed35617dfe8cc169edf452559a3212d85f42cd596db0ebe7d060beb2b0b4819db001415cbbcc5057a669776218dc739d66d85cfd046c

  • SSDEEP

    98304:MjnOmrXXMvwbxILnJVxeMtfCA9gx7JFTxOBe34N4QtfHewnDM/QJY:MjOGsvw9EnJfCLxmeq1nDM/QJ

Malware Config

Targets

    • Target

      7232f4353c71d5937cac64600fc01804f354603b5d1086921cfda57b0649a1de

    • Size

      4.0MB

    • MD5

      9b38f8f3b26a75b6e13b73a366b61abb

    • SHA1

      cc748fb9e5816df5b6e4e5f307bb7b60989c1f9b

    • SHA256

      7232f4353c71d5937cac64600fc01804f354603b5d1086921cfda57b0649a1de

    • SHA512

      0d15e67c0c07bfe25e41ed35617dfe8cc169edf452559a3212d85f42cd596db0ebe7d060beb2b0b4819db001415cbbcc5057a669776218dc739d66d85cfd046c

    • SSDEEP

      98304:MjnOmrXXMvwbxILnJVxeMtfCA9gx7JFTxOBe34N4QtfHewnDM/QJY:MjOGsvw9EnJfCLxmeq1nDM/QJ

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks