General

  • Target

    36c7dc9449d04743848bc5c43f3418d6d035a17ac382e80299826291d454b083

  • Size

    260KB

  • Sample

    221002-2zsayaedh2

  • MD5

    63ed45e84f001fda39530acee1f1d3ab

  • SHA1

    4e567048c90188840aa6caf76c0cd08f2e347df9

  • SHA256

    36c7dc9449d04743848bc5c43f3418d6d035a17ac382e80299826291d454b083

  • SHA512

    dbc51a704410f93192fb48712e1df1b2ab6d97ea1419fd9377d0f3a8fa92cefd2a0ebf83570a0c3f7e1ece6ba06d1741e4dad13281025e1c58ef2c9986ebfdd3

  • SSDEEP

    6144:4Yb//1PxwvdIKCC0ef//uXltKc+LVsz9b8R4jvLXou:YvdFeCXuLKcCVsz6SDLXo

Malware Config

Targets

    • Target

      36c7dc9449d04743848bc5c43f3418d6d035a17ac382e80299826291d454b083

    • Size

      260KB

    • MD5

      63ed45e84f001fda39530acee1f1d3ab

    • SHA1

      4e567048c90188840aa6caf76c0cd08f2e347df9

    • SHA256

      36c7dc9449d04743848bc5c43f3418d6d035a17ac382e80299826291d454b083

    • SHA512

      dbc51a704410f93192fb48712e1df1b2ab6d97ea1419fd9377d0f3a8fa92cefd2a0ebf83570a0c3f7e1ece6ba06d1741e4dad13281025e1c58ef2c9986ebfdd3

    • SSDEEP

      6144:4Yb//1PxwvdIKCC0ef//uXltKc+LVsz9b8R4jvLXou:YvdFeCXuLKcCVsz6SDLXo

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks