General

  • Target

    b877b7de1b96f28deab0077de2e79040f0bd0677c4b05083e145862ee44f70e2

  • Size

    272KB

  • Sample

    220308-jmsf3acgf3

  • MD5

    96d7f0167137bf38582a97df1c8f86a3

  • SHA1

    09b6cb16c01e0611940f47a2ac3082e6ec710bde

  • SHA256

    b877b7de1b96f28deab0077de2e79040f0bd0677c4b05083e145862ee44f70e2

  • SHA512

    cdcd9ca7513a0b05d9e75b31f3b5a9524e044c1e0ad4437a34a257a2378edb4dd98e4b3f79efbb88f49b8cd439bbf7d21d57c98cbee6e6f42b0b3645c7354f0a

Malware Config

Targets

    • Target

      b877b7de1b96f28deab0077de2e79040f0bd0677c4b05083e145862ee44f70e2

    • Size

      272KB

    • MD5

      96d7f0167137bf38582a97df1c8f86a3

    • SHA1

      09b6cb16c01e0611940f47a2ac3082e6ec710bde

    • SHA256

      b877b7de1b96f28deab0077de2e79040f0bd0677c4b05083e145862ee44f70e2

    • SHA512

      cdcd9ca7513a0b05d9e75b31f3b5a9524e044c1e0ad4437a34a257a2378edb4dd98e4b3f79efbb88f49b8cd439bbf7d21d57c98cbee6e6f42b0b3645c7354f0a

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer Payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks