General

  • Target

    7a893b7463e6e6432f9949c53687a4b2bc4f54ad2d206f90faca1d37e8c82947

  • Size

    4.0MB

  • Sample

    220830-cgppnabce4

  • MD5

    d42178bbf32e0a53019634d8c60ef9de

  • SHA1

    fcf8b4bbdd52b5f1b4b16b0084aaaa02fdf2be8d

  • SHA256

    7a893b7463e6e6432f9949c53687a4b2bc4f54ad2d206f90faca1d37e8c82947

  • SHA512

    efae5a61c2a184dcf2266b29bddb6b6ba841d517624edc7b43d108efd18bfadad860b3574d431604ffa12b9b24e71903caa5ecf927e3e40bb86e0108784a59a9

  • SSDEEP

    98304:h08N854HNgIP47wJGx1m2hXtx51/Bq5LPzDE3s:j8OPwwAx1tH/B+P3E

Malware Config

Targets

    • Target

      7a893b7463e6e6432f9949c53687a4b2bc4f54ad2d206f90faca1d37e8c82947

    • Size

      4.0MB

    • MD5

      d42178bbf32e0a53019634d8c60ef9de

    • SHA1

      fcf8b4bbdd52b5f1b4b16b0084aaaa02fdf2be8d

    • SHA256

      7a893b7463e6e6432f9949c53687a4b2bc4f54ad2d206f90faca1d37e8c82947

    • SHA512

      efae5a61c2a184dcf2266b29bddb6b6ba841d517624edc7b43d108efd18bfadad860b3574d431604ffa12b9b24e71903caa5ecf927e3e40bb86e0108784a59a9

    • SSDEEP

      98304:h08N854HNgIP47wJGx1m2hXtx51/Bq5LPzDE3s:j8OPwwAx1tH/B+P3E

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks