General

  • Target

    8fad375a8a496ce65f85dfd94ef6410123c9fa22a3c0b35d9395b8bd79c29033

  • Size

    4.0MB

  • Sample

    220915-d3l2bsfegj

  • MD5

    6fe551628b87a45b85dd17d99078b0f2

  • SHA1

    4b4deab383667dabfd2238ca0e7ceacfec7c881f

  • SHA256

    8fad375a8a496ce65f85dfd94ef6410123c9fa22a3c0b35d9395b8bd79c29033

  • SHA512

    d8f13d1f9f93f10b9709c33e50e997c908b9c007c9e6b91c5d26dd22717321f3f17683f80407a1512ab91f4ac186fb27ded635c284226b038c50a06d551c9aeb

  • SSDEEP

    98304:M0cpGPNDpg483smcnu8+1KsHdBHToravzDy+qo2IwUPM2G:MtsPB83ynjdsHcrmi2w6X

Malware Config

Targets

    • Target

      8fad375a8a496ce65f85dfd94ef6410123c9fa22a3c0b35d9395b8bd79c29033

    • Size

      4.0MB

    • MD5

      6fe551628b87a45b85dd17d99078b0f2

    • SHA1

      4b4deab383667dabfd2238ca0e7ceacfec7c881f

    • SHA256

      8fad375a8a496ce65f85dfd94ef6410123c9fa22a3c0b35d9395b8bd79c29033

    • SHA512

      d8f13d1f9f93f10b9709c33e50e997c908b9c007c9e6b91c5d26dd22717321f3f17683f80407a1512ab91f4ac186fb27ded635c284226b038c50a06d551c9aeb

    • SSDEEP

      98304:M0cpGPNDpg483smcnu8+1KsHdBHToravzDy+qo2IwUPM2G:MtsPB83ynjdsHcrmi2w6X

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks