General

  • Target

    426855460608fcd9c1b2373a1a7190cfa7f91c9b1a4d04658af45a95053c9064

  • Size

    340KB

  • Sample

    220308-xxn4aaahe6

  • MD5

    92ee38e8d9fe99d649037bafb1e9e3ce

  • SHA1

    3713b8781411d2e0d948dfb932ac28e92bc8047b

  • SHA256

    426855460608fcd9c1b2373a1a7190cfa7f91c9b1a4d04658af45a95053c9064

  • SHA512

    3d026f98cdc0bbcfbdfe01c47af000f28c4a76b8c4a904ea14f52f82e617ba0c56e10f9eb7b11edf78267cd949e18d98bfd5a120f04a8650e3c680f959914d10

Malware Config

Targets

    • Target

      426855460608fcd9c1b2373a1a7190cfa7f91c9b1a4d04658af45a95053c9064

    • Size

      340KB

    • MD5

      92ee38e8d9fe99d649037bafb1e9e3ce

    • SHA1

      3713b8781411d2e0d948dfb932ac28e92bc8047b

    • SHA256

      426855460608fcd9c1b2373a1a7190cfa7f91c9b1a4d04658af45a95053c9064

    • SHA512

      3d026f98cdc0bbcfbdfe01c47af000f28c4a76b8c4a904ea14f52f82e617ba0c56e10f9eb7b11edf78267cd949e18d98bfd5a120f04a8650e3c680f959914d10

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer Payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks