General

  • Target

    2a5fe61d1a62b027fa486dec0ce1d977c6ab4b99894ee057bcc11458330adef8

  • Size

    444KB

  • Sample

    221003-j6fllsefg6

  • MD5

    54d38585e6de9f3d9b124708e1fcc0a0

  • SHA1

    dfb01c4fab6e11a0e7355ed0a168f1472fedab40

  • SHA256

    2a5fe61d1a62b027fa486dec0ce1d977c6ab4b99894ee057bcc11458330adef8

  • SHA512

    894638025e4602a6be67dd3024a8b7262f7fbf122ab519efa261e4c36c509b124ffcbc32e6dc4ca37758e4c9f8e1cd8e53abcaf7dfd11a72ed19189136953682

  • SSDEEP

    6144:+RRx55b0YVOCWQf1ozGPu0BDnFwPvp0FAh+lUakxfoPXUKt8GKFq/3KWN1NRHIqx:WnBV2Qf1T5n6Pvp0WDsm1CKWNnRHIu

Malware Config

Targets

    • Target

      2a5fe61d1a62b027fa486dec0ce1d977c6ab4b99894ee057bcc11458330adef8

    • Size

      444KB

    • MD5

      54d38585e6de9f3d9b124708e1fcc0a0

    • SHA1

      dfb01c4fab6e11a0e7355ed0a168f1472fedab40

    • SHA256

      2a5fe61d1a62b027fa486dec0ce1d977c6ab4b99894ee057bcc11458330adef8

    • SHA512

      894638025e4602a6be67dd3024a8b7262f7fbf122ab519efa261e4c36c509b124ffcbc32e6dc4ca37758e4c9f8e1cd8e53abcaf7dfd11a72ed19189136953682

    • SSDEEP

      6144:+RRx55b0YVOCWQf1ozGPu0BDnFwPvp0FAh+lUakxfoPXUKt8GKFq/3KWN1NRHIqx:WnBV2Qf1T5n6Pvp0WDsm1CKWNnRHIu

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks