General

  • Target

    26dacc4039fe46089565614caf19300700e2eae430ac8d7f0f71c3ba652396f6

  • Size

    1.2MB

  • Sample

    220616-hwbz1aage9

  • MD5

    75e1d7d18b37a47f384bcf4ed05ebfd6

  • SHA1

    8fe244eab3110ac69fd87173de07e62c80fa8dae

  • SHA256

    26dacc4039fe46089565614caf19300700e2eae430ac8d7f0f71c3ba652396f6

  • SHA512

    34ff9c146e0f88e8b8e88d515f1d1eb7c5fd336a6aa2f111a9fcdf693c520d4287951f1c1b9f55e94bfad92abeb685c495040a60e5a60ec47fda8793e307c661

Malware Config

Targets

    • Target

      26dacc4039fe46089565614caf19300700e2eae430ac8d7f0f71c3ba652396f6

    • Size

      1.2MB

    • MD5

      75e1d7d18b37a47f384bcf4ed05ebfd6

    • SHA1

      8fe244eab3110ac69fd87173de07e62c80fa8dae

    • SHA256

      26dacc4039fe46089565614caf19300700e2eae430ac8d7f0f71c3ba652396f6

    • SHA512

      34ff9c146e0f88e8b8e88d515f1d1eb7c5fd336a6aa2f111a9fcdf693c520d4287951f1c1b9f55e94bfad92abeb685c495040a60e5a60ec47fda8793e307c661

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer Payload

    • suricata: ET MALWARE ISRStealer Checkin

      suricata: ET MALWARE ISRStealer Checkin

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks