General

  • Target

    dd7f8279647853a150bd3ee08925d4c079de2acb210db8dec09a1fad53248a1c

  • Size

    4.0MB

  • Sample

    220915-d5qgjafehj

  • MD5

    148e1ad6541bab2335689bcdbf1f1c90

  • SHA1

    373d281dbe13538bebb3abf728f9e8530f1e3de1

  • SHA256

    dd7f8279647853a150bd3ee08925d4c079de2acb210db8dec09a1fad53248a1c

  • SHA512

    fb4aca6054b7a334831e3c17e60709de73ee081c006daf81945bdc0219c8b22c1871f4ad1185fd1fa141ca482a891ee5aab5405eb8def4b2f88c53b02ed03207

  • SSDEEP

    98304:2emOBBB+kSDxxOMp8AtZhhM1eirpfvXAWxDD3g/vq2qoDMkN:22BBD6OMptZhhMZtfvXbxDD3MLqBk

Malware Config

Targets

    • Target

      dd7f8279647853a150bd3ee08925d4c079de2acb210db8dec09a1fad53248a1c

    • Size

      4.0MB

    • MD5

      148e1ad6541bab2335689bcdbf1f1c90

    • SHA1

      373d281dbe13538bebb3abf728f9e8530f1e3de1

    • SHA256

      dd7f8279647853a150bd3ee08925d4c079de2acb210db8dec09a1fad53248a1c

    • SHA512

      fb4aca6054b7a334831e3c17e60709de73ee081c006daf81945bdc0219c8b22c1871f4ad1185fd1fa141ca482a891ee5aab5405eb8def4b2f88c53b02ed03207

    • SSDEEP

      98304:2emOBBB+kSDxxOMp8AtZhhM1eirpfvXAWxDD3g/vq2qoDMkN:22BBD6OMptZhhMZtfvXbxDD3MLqBk

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks