General

  • Target

    fb476e8cd10587ebb49487f1d95165fc1a3065038edcea30c725d9ad1ab015a1

  • Size

    549KB

  • Sample

    220315-q8aayaccd8

  • MD5

    c0d8542ea3bac647aab1df09704498dd

  • SHA1

    0003125e07acb64a613f29435c8a19ec4e8f2805

  • SHA256

    fb476e8cd10587ebb49487f1d95165fc1a3065038edcea30c725d9ad1ab015a1

  • SHA512

    3f1090fe34694cf067d938288cf7e44d5222f92e4f33227ee18e58065e42b4bee91126340662b5647dc0679a8c7fd20973aadc5c24fc89be6b747a385c521e92

Malware Config

Targets

    • Target

      fb476e8cd10587ebb49487f1d95165fc1a3065038edcea30c725d9ad1ab015a1

    • Size

      549KB

    • MD5

      c0d8542ea3bac647aab1df09704498dd

    • SHA1

      0003125e07acb64a613f29435c8a19ec4e8f2805

    • SHA256

      fb476e8cd10587ebb49487f1d95165fc1a3065038edcea30c725d9ad1ab015a1

    • SHA512

      3f1090fe34694cf067d938288cf7e44d5222f92e4f33227ee18e58065e42b4bee91126340662b5647dc0679a8c7fd20973aadc5c24fc89be6b747a385c521e92

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer Payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks