General

  • Target

    7ad64ddd8bacd28406e637075a739a21ca413dc6996a5eae7398543d0e4990c2

  • Size

    4.0MB

  • Sample

    220830-cgybssbce5

  • MD5

    794e8cb948a193ee5c57e7b6d2339f07

  • SHA1

    7cc52560a644bbe42e5927694308aaa6e18c6f55

  • SHA256

    7ad64ddd8bacd28406e637075a739a21ca413dc6996a5eae7398543d0e4990c2

  • SHA512

    db8e981241f899f4fd452f7b1e7ca3ee48a9329802f44e7395acd0acc20e1641a21cec85320ffbd4344768ff48ee30c646d980fed09877a45f90a0aeecd5a180

  • SSDEEP

    98304:Z5z0eTFhinqjLXQmPcqV8MxdG3bmzSBk6IJEllCZFWW3VE27O6G:0eTHUqHXQKczMXWC+S9JEAn627w

Malware Config

Targets

    • Target

      7ad64ddd8bacd28406e637075a739a21ca413dc6996a5eae7398543d0e4990c2

    • Size

      4.0MB

    • MD5

      794e8cb948a193ee5c57e7b6d2339f07

    • SHA1

      7cc52560a644bbe42e5927694308aaa6e18c6f55

    • SHA256

      7ad64ddd8bacd28406e637075a739a21ca413dc6996a5eae7398543d0e4990c2

    • SHA512

      db8e981241f899f4fd452f7b1e7ca3ee48a9329802f44e7395acd0acc20e1641a21cec85320ffbd4344768ff48ee30c646d980fed09877a45f90a0aeecd5a180

    • SSDEEP

      98304:Z5z0eTFhinqjLXQmPcqV8MxdG3bmzSBk6IJEllCZFWW3VE27O6G:0eTHUqHXQKczMXWC+S9JEAn627w

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks