General

  • Target

    3d948e39198a851d73337ede0025543f4833ecc0f8b88f61c5f4ce8ef643908f

  • Size

    4.0MB

  • Sample

    220915-d1ffrsfefm

  • MD5

    c8285db83bfd7f5dec56f11b4686ed6c

  • SHA1

    46ff3a7cfbcd6a37ee30e22c363cfa57d98e333a

  • SHA256

    3d948e39198a851d73337ede0025543f4833ecc0f8b88f61c5f4ce8ef643908f

  • SHA512

    952a6c241662444dc1cd8dd116ff098cb17e700be7a8ea55d67f74d84c84cdf45579f35f2774992039a397353736e14ddea3f5d9906b6d4a48f78ca140375ff9

  • SSDEEP

    98304:YGMnuzHcD98bHmO3Dt5CUXtQeej40THGA4xg6jGJ:96uzcD98Z3DW2QHTHhCg

Malware Config

Targets

    • Target

      3d948e39198a851d73337ede0025543f4833ecc0f8b88f61c5f4ce8ef643908f

    • Size

      4.0MB

    • MD5

      c8285db83bfd7f5dec56f11b4686ed6c

    • SHA1

      46ff3a7cfbcd6a37ee30e22c363cfa57d98e333a

    • SHA256

      3d948e39198a851d73337ede0025543f4833ecc0f8b88f61c5f4ce8ef643908f

    • SHA512

      952a6c241662444dc1cd8dd116ff098cb17e700be7a8ea55d67f74d84c84cdf45579f35f2774992039a397353736e14ddea3f5d9906b6d4a48f78ca140375ff9

    • SSDEEP

      98304:YGMnuzHcD98bHmO3Dt5CUXtQeej40THGA4xg6jGJ:96uzcD98Z3DW2QHTHhCg

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks