General

  • Target

    132056e5d63b84a40734ac2365756e9fdea92a8dbbe37dd55b26281056f7b5d0

  • Size

    665KB

  • Sample

    220616-dq8pkaccc4

  • MD5

    9f0468e88be1ae4bb8880bcfcb4d5d4a

  • SHA1

    8948672d1a4f1d50f63475e8c6a5cac6593e891c

  • SHA256

    132056e5d63b84a40734ac2365756e9fdea92a8dbbe37dd55b26281056f7b5d0

  • SHA512

    02950743196ad08a2f14f3e013db4c819674d1748b7454bd5f1f69f00fd39d20940a8ecba6e2d985d270f3d3ec8db1bca93a116ad3a6d2384cfb339f97a7f085

Malware Config

Targets

    • Target

      132056e5d63b84a40734ac2365756e9fdea92a8dbbe37dd55b26281056f7b5d0

    • Size

      665KB

    • MD5

      9f0468e88be1ae4bb8880bcfcb4d5d4a

    • SHA1

      8948672d1a4f1d50f63475e8c6a5cac6593e891c

    • SHA256

      132056e5d63b84a40734ac2365756e9fdea92a8dbbe37dd55b26281056f7b5d0

    • SHA512

      02950743196ad08a2f14f3e013db4c819674d1748b7454bd5f1f69f00fd39d20940a8ecba6e2d985d270f3d3ec8db1bca93a116ad3a6d2384cfb339f97a7f085

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer Payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks