General

  • Target

    45e7ae0272b89cfd4437267c6062fd5ea9247c369a7b4a0465d3d1942a62659a

  • Size

    467KB

  • Sample

    221003-kd49yagfdk

  • MD5

    6ec3bac962c40daf8da977aae6b0a180

  • SHA1

    e2b0a2d2869669f0e57ba6a81754fb4f6956d90d

  • SHA256

    45e7ae0272b89cfd4437267c6062fd5ea9247c369a7b4a0465d3d1942a62659a

  • SHA512

    4288187446e2eb074ddddc84f7f8f3e0335e8bf9bc06d17af460e9283d225b36badac9ceee80ef6f5572d24c726413546ad7034e53d70fe14a340a006fb9098f

  • SSDEEP

    12288:h5SQ/ZG0hAcaLqSUV4Euoruh+6MGEFdXLmYb:31/ILVUJ5rgDMTdfb

Malware Config

Targets

    • Target

      45e7ae0272b89cfd4437267c6062fd5ea9247c369a7b4a0465d3d1942a62659a

    • Size

      467KB

    • MD5

      6ec3bac962c40daf8da977aae6b0a180

    • SHA1

      e2b0a2d2869669f0e57ba6a81754fb4f6956d90d

    • SHA256

      45e7ae0272b89cfd4437267c6062fd5ea9247c369a7b4a0465d3d1942a62659a

    • SHA512

      4288187446e2eb074ddddc84f7f8f3e0335e8bf9bc06d17af460e9283d225b36badac9ceee80ef6f5572d24c726413546ad7034e53d70fe14a340a006fb9098f

    • SSDEEP

      12288:h5SQ/ZG0hAcaLqSUV4Euoruh+6MGEFdXLmYb:31/ILVUJ5rgDMTdfb

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks