General

  • Target

    27d0d28bfd7016b70a64b54b3ac8ae1e3d0823fc9d81d3e2677a07ad39a91311

  • Size

    609KB

  • Sample

    220616-dq98dsccc5

  • MD5

    811ce3bd9bed6f69f79f8167c9556691

  • SHA1

    3060d579cbb65c675f73e3dad5560f9e48c5e585

  • SHA256

    27d0d28bfd7016b70a64b54b3ac8ae1e3d0823fc9d81d3e2677a07ad39a91311

  • SHA512

    3b3e72ad4e6f5b574e9f96c81713a97a2f547d4d851869c400c4f132f894fcc253ae805bc11c9740f9fdc4a20ab7c1a1f5814d313e1bf3d6c6cf33904207c5c5

Malware Config

Targets

    • Target

      order.scr

    • Size

      665KB

    • MD5

      9f0468e88be1ae4bb8880bcfcb4d5d4a

    • SHA1

      8948672d1a4f1d50f63475e8c6a5cac6593e891c

    • SHA256

      132056e5d63b84a40734ac2365756e9fdea92a8dbbe37dd55b26281056f7b5d0

    • SHA512

      02950743196ad08a2f14f3e013db4c819674d1748b7454bd5f1f69f00fd39d20940a8ecba6e2d985d270f3d3ec8db1bca93a116ad3a6d2384cfb339f97a7f085

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks