General

  • Target

    4fded95fb71c1918c15f2ec21cedad80698fa1bd8e34c01e2f23c90237050226

  • Size

    1.0MB

  • Sample

    220719-yarrbsaec2

  • MD5

    669fc906d8becd3d67f3d13317e53334

  • SHA1

    80e9a8fe7084fd5d36ed4b1324ca1532ef5dc0c3

  • SHA256

    4fded95fb71c1918c15f2ec21cedad80698fa1bd8e34c01e2f23c90237050226

  • SHA512

    6b346ccf649d4bd1db953e2509442fdd2da21e182e237d43b116ffcb8af64b2403ca43a0f844f1a2fcc545a5fac6aba2ff144808dee11130af367e672275d2be

Malware Config

Targets

    • Target

      4fded95fb71c1918c15f2ec21cedad80698fa1bd8e34c01e2f23c90237050226

    • Size

      1.0MB

    • MD5

      669fc906d8becd3d67f3d13317e53334

    • SHA1

      80e9a8fe7084fd5d36ed4b1324ca1532ef5dc0c3

    • SHA256

      4fded95fb71c1918c15f2ec21cedad80698fa1bd8e34c01e2f23c90237050226

    • SHA512

      6b346ccf649d4bd1db953e2509442fdd2da21e182e237d43b116ffcb8af64b2403ca43a0f844f1a2fcc545a5fac6aba2ff144808dee11130af367e672275d2be

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks