General

  • Target

    9d5a6da26f199c73e2afe8ed3154e952b49ff4e8c5325073008b3e514474f4fb

  • Size

    4.3MB

  • Sample

    220904-rv5elahbdl

  • MD5

    fc4d55c45508949cbb2607902f101ca3

  • SHA1

    c22433598efcff07827d0969442da0a2f8baf206

  • SHA256

    9d5a6da26f199c73e2afe8ed3154e952b49ff4e8c5325073008b3e514474f4fb

  • SHA512

    1b3306c541acd9fb9ca9429de324ef4e812fe155ec3524181fe5c1167393cce7d94edb63059440a80054574a8c994ec628c20c93f7a6980c4092390151500ded

  • SSDEEP

    98304:ZF8INgSEwbJ3mKXMHrsXzVh6b80ncPVoosmBEthq/Ckm:TEwBbXMHrsXzVcCEmuthK9m

Malware Config

Targets

    • Target

      9d5a6da26f199c73e2afe8ed3154e952b49ff4e8c5325073008b3e514474f4fb

    • Size

      4.3MB

    • MD5

      fc4d55c45508949cbb2607902f101ca3

    • SHA1

      c22433598efcff07827d0969442da0a2f8baf206

    • SHA256

      9d5a6da26f199c73e2afe8ed3154e952b49ff4e8c5325073008b3e514474f4fb

    • SHA512

      1b3306c541acd9fb9ca9429de324ef4e812fe155ec3524181fe5c1167393cce7d94edb63059440a80054574a8c994ec628c20c93f7a6980c4092390151500ded

    • SSDEEP

      98304:ZF8INgSEwbJ3mKXMHrsXzVh6b80ncPVoosmBEthq/Ckm:TEwBbXMHrsXzVcCEmuthK9m

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks