General

  • Target

    282af5294cd9e32e8c4cc3faa90fb46082571679d7d37e30aef2755ec8b71c11

  • Size

    1.4MB

  • Sample

    220616-chnhzsaaf9

  • MD5

    72e772a6c4da883b1ca8908ed182036d

  • SHA1

    04ff56a156750d83ce715a79e3e6250b3e7b4b81

  • SHA256

    282af5294cd9e32e8c4cc3faa90fb46082571679d7d37e30aef2755ec8b71c11

  • SHA512

    532d6c2d9e29c1c75ce1ee9a950978154361f2dbf4c5bc289bb06372f4133c35b6b4218f0c4a47257a899a87ea74cd9a1fbc7235a839b8dda305d6842cda266f

Malware Config

Targets

    • Target

      282af5294cd9e32e8c4cc3faa90fb46082571679d7d37e30aef2755ec8b71c11

    • Size

      1.4MB

    • MD5

      72e772a6c4da883b1ca8908ed182036d

    • SHA1

      04ff56a156750d83ce715a79e3e6250b3e7b4b81

    • SHA256

      282af5294cd9e32e8c4cc3faa90fb46082571679d7d37e30aef2755ec8b71c11

    • SHA512

      532d6c2d9e29c1c75ce1ee9a950978154361f2dbf4c5bc289bb06372f4133c35b6b4218f0c4a47257a899a87ea74cd9a1fbc7235a839b8dda305d6842cda266f

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer Payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks