General

  • Target

    3848e61897e3fbc185353a109e0de82164d50a00e1c793290ad7cfd53a9807b4

  • Size

    762KB

  • Sample

    220612-3qf2zsbhgq

  • MD5

    1c4dbd755e7ba59d2a4ce457f09f755b

  • SHA1

    80b81ba84a6a507c241f5a99e34153fab47d3f0b

  • SHA256

    3848e61897e3fbc185353a109e0de82164d50a00e1c793290ad7cfd53a9807b4

  • SHA512

    55a509c9a3be54093b13409da0f7720932e5eb9fab3d6322bcdef0755584aff10224bc98b4ae3db68261900e9a56359416cc0cffde429c0d0cf09fdccd07c90d

Malware Config

Targets

    • Target

      3848e61897e3fbc185353a109e0de82164d50a00e1c793290ad7cfd53a9807b4

    • Size

      762KB

    • MD5

      1c4dbd755e7ba59d2a4ce457f09f755b

    • SHA1

      80b81ba84a6a507c241f5a99e34153fab47d3f0b

    • SHA256

      3848e61897e3fbc185353a109e0de82164d50a00e1c793290ad7cfd53a9807b4

    • SHA512

      55a509c9a3be54093b13409da0f7720932e5eb9fab3d6322bcdef0755584aff10224bc98b4ae3db68261900e9a56359416cc0cffde429c0d0cf09fdccd07c90d

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer Payload

    • suricata: ET MALWARE ISRStealer Checkin

      suricata: ET MALWARE ISRStealer Checkin

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks