General

  • Target

    f0f426d9aa1c7f72de74d9b43460d71e83299ca3789be97a4e5c12ebf5dd2695

  • Size

    208KB

  • Sample

    220306-q3jbnaahd9

  • MD5

    3bcb9d38f0d55ede82f92483612ae100

  • SHA1

    6b354be237fbb3d3e656eb08b25e88988d50aca0

  • SHA256

    f0f426d9aa1c7f72de74d9b43460d71e83299ca3789be97a4e5c12ebf5dd2695

  • SHA512

    f92dd81efd6b737b5ff247538da1bc51b35ed3f8225acdddd191146f8b658dd7f3595a7d2cae027d8fa973d3beda32a747e09d16ba6afd91ac981ec4b5172b09

Malware Config

Targets

    • Target

      f0f426d9aa1c7f72de74d9b43460d71e83299ca3789be97a4e5c12ebf5dd2695

    • Size

      208KB

    • MD5

      3bcb9d38f0d55ede82f92483612ae100

    • SHA1

      6b354be237fbb3d3e656eb08b25e88988d50aca0

    • SHA256

      f0f426d9aa1c7f72de74d9b43460d71e83299ca3789be97a4e5c12ebf5dd2695

    • SHA512

      f92dd81efd6b737b5ff247538da1bc51b35ed3f8225acdddd191146f8b658dd7f3595a7d2cae027d8fa973d3beda32a747e09d16ba6afd91ac981ec4b5172b09

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks