General

  • Target

    29d024a8b7e02bddc35ff727883a6039dc15cb9a003f2aa09b843a1490db5c45

  • Size

    350KB

  • Sample

    221001-3tjbhsdfhn

  • MD5

    a84c6c2a6a5627b2544b1c831703abd7

  • SHA1

    55d98f15ee6f13b9e455238cebadf1e8b105bac3

  • SHA256

    29d024a8b7e02bddc35ff727883a6039dc15cb9a003f2aa09b843a1490db5c45

  • SHA512

    150d07599f05d057c618aa4412e5d343f440264380aefd19b1a1b3b1c37926c932d6b223bdeea9b3a8e8b4a626fe03fc0b8b4cccb23e266d4f45b0c32f8a8569

  • SSDEEP

    6144:iQeCfZrhChF1+/j/g27x7XWQP0WPcr/szOXqle2RZiQ:iQBfZgF1+U27x7mQP0rTqOMeg

Malware Config

Targets

    • Target

      29d024a8b7e02bddc35ff727883a6039dc15cb9a003f2aa09b843a1490db5c45

    • Size

      350KB

    • MD5

      a84c6c2a6a5627b2544b1c831703abd7

    • SHA1

      55d98f15ee6f13b9e455238cebadf1e8b105bac3

    • SHA256

      29d024a8b7e02bddc35ff727883a6039dc15cb9a003f2aa09b843a1490db5c45

    • SHA512

      150d07599f05d057c618aa4412e5d343f440264380aefd19b1a1b3b1c37926c932d6b223bdeea9b3a8e8b4a626fe03fc0b8b4cccb23e266d4f45b0c32f8a8569

    • SSDEEP

      6144:iQeCfZrhChF1+/j/g27x7XWQP0WPcr/szOXqle2RZiQ:iQBfZgF1+U27x7mQP0rTqOMeg

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks