General

  • Target

    4f851094891460acb9aee4b0273dc8f8b1dd760e63233daf93cdb21b57e8f3ab

  • Size

    260KB

  • Sample

    221002-lrs99shhb3

  • MD5

    6bb6057b3d183d8966b50ccbe364b370

  • SHA1

    ea48392d5dcd15f64a2d1cb9108c6141c1aabce3

  • SHA256

    4f851094891460acb9aee4b0273dc8f8b1dd760e63233daf93cdb21b57e8f3ab

  • SHA512

    ea0c2ed98a48cdeb35168d108aeebc50108f75ab64e8538cf323ae03e9c900f67995dfe19c1520debc0ef2dadd1468e1cc2aae7bd488f82f5fe58dbd3f8b581d

  • SSDEEP

    6144:gYb//1PxwDdIKCC0ef//uXltKc+LVsz9b8R4jvLXou:wDdFeCXuLKcCVsz6SDLXo

Malware Config

Targets

    • Target

      4f851094891460acb9aee4b0273dc8f8b1dd760e63233daf93cdb21b57e8f3ab

    • Size

      260KB

    • MD5

      6bb6057b3d183d8966b50ccbe364b370

    • SHA1

      ea48392d5dcd15f64a2d1cb9108c6141c1aabce3

    • SHA256

      4f851094891460acb9aee4b0273dc8f8b1dd760e63233daf93cdb21b57e8f3ab

    • SHA512

      ea0c2ed98a48cdeb35168d108aeebc50108f75ab64e8538cf323ae03e9c900f67995dfe19c1520debc0ef2dadd1468e1cc2aae7bd488f82f5fe58dbd3f8b581d

    • SSDEEP

      6144:gYb//1PxwDdIKCC0ef//uXltKc+LVsz9b8R4jvLXou:wDdFeCXuLKcCVsz6SDLXo

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks