General

  • Target

    c8434e5546f62440bcc26ce8b1b620d7772e44630893e3b5d06e8ad4e113d55b.rl.zip

  • Size

    5.0MB

  • Sample

    220831-y7t8qadbc4

  • MD5

    dedc25da6e88560309c8e72af753abff

  • SHA1

    498e24b336f937a495fd2c678a1cefad00ef2a65

  • SHA256

    53f838b7dd1eca1ba0fb9f7accf923d613eae20ebd81647179d356ff201f2458

  • SHA512

    54fcc11cc8d6e59c25b15f1dbaf954bb96732d86367820aeb68247e82f1cdec8c363d24b0f24410e9a87698bd1e6cca5bd80948cf84288baac0a3b2fa89faef1

  • SSDEEP

    98304:isAtOPzEtdVp8laL9ob8Lp0/vDHNQjTMjlS2YHtP6/5W6iWRJaCy9w5sgq:iKL8p66obYYvDZlpBT9Jp1q

Score
10/10

Malware Config

Targets

    • Target

      0099da3acbf4982f1d1ad92978afa3aa38d17258.rl

    • Size

      14.3MB

    • MD5

      72583f976568e39c772c67962c9aeb36

    • SHA1

      0099da3acbf4982f1d1ad92978afa3aa38d17258

    • SHA256

      f1a438dc4bc7a96919c5a4d84a999cf22a69a50d17920ac23ab462a7c6be70ab

    • SHA512

      9c2d9ef6c95732559ad83cd244e8981c8e5428bdb833a72ebab5c723ebd3e0f236f16a0d99a93390b2d451c03d699c6311a341a0f8267154da932d3922275bce

    • SSDEEP

      98304:Vr0ZHdsGv80rd/ISan4iy9fEqEjF/EZUjMsHC9VZS/gE:89vnO39GVJ

    Score
    10/10
    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks