General

  • Target

    1d6e9330c7356b142df677459030302eaadc92216e1520342be3f06e6e167df7

  • Size

    4.0MB

  • Sample

    220915-dybd2abgh9

  • MD5

    d5dab75c273bc938f65d8462ae9ffbf5

  • SHA1

    6655d6851725fff1dc988d4163b09e36d2e1aeea

  • SHA256

    1d6e9330c7356b142df677459030302eaadc92216e1520342be3f06e6e167df7

  • SHA512

    78a45ec57c5e8c4d26c306e5c9d36799b2d0ae2e840265d69e0ffe4de5e654ab53d90473505c4127bab7a3130e3ca34d8d2948d748cccab7d89bfcafdd614e88

  • SSDEEP

    98304:lZqtVn5att1ZTPSoD2udornfivU9NH5iiQ2NT7l5YGZ:lWOZjSoK4o7KvU91c2t7laG

Malware Config

Targets

    • Target

      1d6e9330c7356b142df677459030302eaadc92216e1520342be3f06e6e167df7

    • Size

      4.0MB

    • MD5

      d5dab75c273bc938f65d8462ae9ffbf5

    • SHA1

      6655d6851725fff1dc988d4163b09e36d2e1aeea

    • SHA256

      1d6e9330c7356b142df677459030302eaadc92216e1520342be3f06e6e167df7

    • SHA512

      78a45ec57c5e8c4d26c306e5c9d36799b2d0ae2e840265d69e0ffe4de5e654ab53d90473505c4127bab7a3130e3ca34d8d2948d748cccab7d89bfcafdd614e88

    • SSDEEP

      98304:lZqtVn5att1ZTPSoD2udornfivU9NH5iiQ2NT7l5YGZ:lWOZjSoK4o7KvU91c2t7laG

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks