General

  • Target

    cdff44668207a42d3e83721029d666d72482b696e2e6db8e8dbc4f8b3440370b

  • Size

    340KB

  • Sample

    221001-3wqtdacef4

  • MD5

    dfe4a1cd1e822fba707b9d20017d0084

  • SHA1

    e273c86578c9207b08c5d0517438cef0677a0330

  • SHA256

    cdff44668207a42d3e83721029d666d72482b696e2e6db8e8dbc4f8b3440370b

  • SHA512

    7e57b2e54741952da97c0c82631aba1a16dcbc797ff8500b3ae0f4d431e2d73ba742fb41378a3e61cafc96829a3c1a37be7c339780ed640d3c5eb6c5bce62c49

  • SSDEEP

    6144:PXUQPN4gKo6iLoHIZvHPfrDW/MAfxitOW3IVhoOtmKWJVSFS1/uLJI:PigKoBcHWry/bjI2IVu

Malware Config

Targets

    • Target

      cdff44668207a42d3e83721029d666d72482b696e2e6db8e8dbc4f8b3440370b

    • Size

      340KB

    • MD5

      dfe4a1cd1e822fba707b9d20017d0084

    • SHA1

      e273c86578c9207b08c5d0517438cef0677a0330

    • SHA256

      cdff44668207a42d3e83721029d666d72482b696e2e6db8e8dbc4f8b3440370b

    • SHA512

      7e57b2e54741952da97c0c82631aba1a16dcbc797ff8500b3ae0f4d431e2d73ba742fb41378a3e61cafc96829a3c1a37be7c339780ed640d3c5eb6c5bce62c49

    • SSDEEP

      6144:PXUQPN4gKo6iLoHIZvHPfrDW/MAfxitOW3IVhoOtmKWJVSFS1/uLJI:PigKoBcHWry/bjI2IVu

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • Loads dropped DLL

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks