General

  • Target

    9c328e11662d561e2ff77a7d6888122f93254f79b2541e7d47b5266bc28712ca

  • Size

    260KB

  • Sample

    221011-e343ksegcl

  • MD5

    6c9ffd9ae46f9e10d3aa64803cfbb790

  • SHA1

    5df512d6d7bb057db4377291d85dddc3de2f4b16

  • SHA256

    9c328e11662d561e2ff77a7d6888122f93254f79b2541e7d47b5266bc28712ca

  • SHA512

    15582f92b7f874de29fc390b4041fe7b05e7f5a7c08d7bb6bc15781f9880ff42ca7c2739d17cc3cb17d68bb349e512daf7b5f76e7ec68140924618c940e0eb52

  • SSDEEP

    6144:PYb//1PxwVdIKCC0ef//uXltKc+LVsz9b8R4jvLXou:lVdFeCXuLKcCVsz6SDLXo

Malware Config

Targets

    • Target

      9c328e11662d561e2ff77a7d6888122f93254f79b2541e7d47b5266bc28712ca

    • Size

      260KB

    • MD5

      6c9ffd9ae46f9e10d3aa64803cfbb790

    • SHA1

      5df512d6d7bb057db4377291d85dddc3de2f4b16

    • SHA256

      9c328e11662d561e2ff77a7d6888122f93254f79b2541e7d47b5266bc28712ca

    • SHA512

      15582f92b7f874de29fc390b4041fe7b05e7f5a7c08d7bb6bc15781f9880ff42ca7c2739d17cc3cb17d68bb349e512daf7b5f76e7ec68140924618c940e0eb52

    • SSDEEP

      6144:PYb//1PxwVdIKCC0ef//uXltKc+LVsz9b8R4jvLXou:lVdFeCXuLKcCVsz6SDLXo

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks