General

  • Target

    f47c8f408d8b654fb111d22937ad2445a6b2deeb3b6008a23a54d9520ca6c5df

  • Size

    549KB

  • Sample

    220313-lh7fjafdbl

  • MD5

    376fe5034ac55ecf08bbd54b14e3458a

  • SHA1

    09b537109862bfaff6f9df62ad09b8f395cd866d

  • SHA256

    f47c8f408d8b654fb111d22937ad2445a6b2deeb3b6008a23a54d9520ca6c5df

  • SHA512

    a3bb779d41db84d0e45c4da1d6483beb0b12af85546bbdeb5734dcfde55311ab117eecf78276b35b4000171189e1eeb299180b6a4068016b75ea8c554b45b13f

Malware Config

Targets

    • Target

      f47c8f408d8b654fb111d22937ad2445a6b2deeb3b6008a23a54d9520ca6c5df

    • Size

      549KB

    • MD5

      376fe5034ac55ecf08bbd54b14e3458a

    • SHA1

      09b537109862bfaff6f9df62ad09b8f395cd866d

    • SHA256

      f47c8f408d8b654fb111d22937ad2445a6b2deeb3b6008a23a54d9520ca6c5df

    • SHA512

      a3bb779d41db84d0e45c4da1d6483beb0b12af85546bbdeb5734dcfde55311ab117eecf78276b35b4000171189e1eeb299180b6a4068016b75ea8c554b45b13f

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer Payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks