General

  • Target

    bcf34e8cace1019595951cd92f2e72dc3ebf56d9e3da60bf154016c0eb39679f

  • Size

    4.0MB

  • Sample

    220915-d4wl6abhc7

  • MD5

    bf9d64304766018088b496f834a90e63

  • SHA1

    80eb5b8cca94cf12b2cbc0ecd7bafe6026f551de

  • SHA256

    bcf34e8cace1019595951cd92f2e72dc3ebf56d9e3da60bf154016c0eb39679f

  • SHA512

    937318853f2b1d826e829c13f84a0f080f9d91127489ff56b81488b2bece85bcb225dd34f76a3ce66039e9d42ee2de8dd53f524231c07847f71cb138c14d3367

  • SSDEEP

    98304:t+bUNEK+/h612B67IvZLpkAsb20j4UW1CRK:gDZ68sIRdP423UW1C

Malware Config

Targets

    • Target

      bcf34e8cace1019595951cd92f2e72dc3ebf56d9e3da60bf154016c0eb39679f

    • Size

      4.0MB

    • MD5

      bf9d64304766018088b496f834a90e63

    • SHA1

      80eb5b8cca94cf12b2cbc0ecd7bafe6026f551de

    • SHA256

      bcf34e8cace1019595951cd92f2e72dc3ebf56d9e3da60bf154016c0eb39679f

    • SHA512

      937318853f2b1d826e829c13f84a0f080f9d91127489ff56b81488b2bece85bcb225dd34f76a3ce66039e9d42ee2de8dd53f524231c07847f71cb138c14d3367

    • SSDEEP

      98304:t+bUNEK+/h612B67IvZLpkAsb20j4UW1CRK:gDZ68sIRdP423UW1C

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks