General

  • Target

    c9e25b31a594a4cb867bae75bfe9900405d1b2e00eb231e3588da6e4319e0087

  • Size

    386KB

  • Sample

    220308-g4c2laegen

  • MD5

    c797d7a9adbc5012b79487311efcfd1d

  • SHA1

    b36e3f2f4baa0ff0409351b8e285787cbe19d1c1

  • SHA256

    c9e25b31a594a4cb867bae75bfe9900405d1b2e00eb231e3588da6e4319e0087

  • SHA512

    030c1e3b1fc676b03841dc758de7b76d1ad54c31883248cc3aea4db23b64507958c64bf771d3247149626eb5d7b7fdb3a0bbf2b5115cb31fc5088eff35866b02

Malware Config

Targets

    • Target

      c9e25b31a594a4cb867bae75bfe9900405d1b2e00eb231e3588da6e4319e0087

    • Size

      386KB

    • MD5

      c797d7a9adbc5012b79487311efcfd1d

    • SHA1

      b36e3f2f4baa0ff0409351b8e285787cbe19d1c1

    • SHA256

      c9e25b31a594a4cb867bae75bfe9900405d1b2e00eb231e3588da6e4319e0087

    • SHA512

      030c1e3b1fc676b03841dc758de7b76d1ad54c31883248cc3aea4db23b64507958c64bf771d3247149626eb5d7b7fdb3a0bbf2b5115cb31fc5088eff35866b02

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer Payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks