General

  • Target

    80cc0a0a4fec7476f0453e741822757124a41e7096675003c1c0e20c9e471a31

  • Size

    4.0MB

  • Sample

    220830-chnhzsaccq

  • MD5

    bb9bdd70279f3323c34a42ec301cded6

  • SHA1

    12967ba3af210c3032a241a01354e30c9464ff71

  • SHA256

    80cc0a0a4fec7476f0453e741822757124a41e7096675003c1c0e20c9e471a31

  • SHA512

    6fdb933d66b5f29559372fb240124660e6692c081a59682202b1a72a5885f24ac16422bef2ed42827777c6d190650cfd245c615e306be700393dde73b85afc53

  • SSDEEP

    49152:yWtH6EVy6gHmDVWfyWnlY0DWjNkkvY9Ewrx+HQ4Mxj2X+VewkFzXohdsBT41Xt/B:yWKmhBWs9w9TIw5xy+Ve1FzYbsBs

Malware Config

Targets

    • Target

      80cc0a0a4fec7476f0453e741822757124a41e7096675003c1c0e20c9e471a31

    • Size

      4.0MB

    • MD5

      bb9bdd70279f3323c34a42ec301cded6

    • SHA1

      12967ba3af210c3032a241a01354e30c9464ff71

    • SHA256

      80cc0a0a4fec7476f0453e741822757124a41e7096675003c1c0e20c9e471a31

    • SHA512

      6fdb933d66b5f29559372fb240124660e6692c081a59682202b1a72a5885f24ac16422bef2ed42827777c6d190650cfd245c615e306be700393dde73b85afc53

    • SSDEEP

      49152:yWtH6EVy6gHmDVWfyWnlY0DWjNkkvY9Ewrx+HQ4Mxj2X+VewkFzXohdsBT41Xt/B:yWKmhBWs9w9TIw5xy+Ve1FzYbsBs

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks