General

  • Target

    e2583b3df9a994bc3e4fbeaf863dbe8788f53b5baf8cbbbc650c704fc023262a

  • Size

    341KB

  • Sample

    221011-kkww5sede8

  • MD5

    68a94a193ca67af0944be8757486bd80

  • SHA1

    6d5d05ff79f122901cbd4121b618571d1852dbd7

  • SHA256

    e2583b3df9a994bc3e4fbeaf863dbe8788f53b5baf8cbbbc650c704fc023262a

  • SHA512

    cfee74e3408b8dd913edc719f787e525d6303416801eeecc1bbf4c5aa51447246952ec79cdac7106e379dca3a209a2bdcda7c19bac22e3822509b11e48ae7130

  • SSDEEP

    6144:Icaxda88spxIhnnwY9ZextcjXmFijjorrsRqEH+bNFbq1f+WvzP3O4yhu:Xa288EeRweZLXmFiPoMwrNxn8

Malware Config

Targets

    • Target

      e2583b3df9a994bc3e4fbeaf863dbe8788f53b5baf8cbbbc650c704fc023262a

    • Size

      341KB

    • MD5

      68a94a193ca67af0944be8757486bd80

    • SHA1

      6d5d05ff79f122901cbd4121b618571d1852dbd7

    • SHA256

      e2583b3df9a994bc3e4fbeaf863dbe8788f53b5baf8cbbbc650c704fc023262a

    • SHA512

      cfee74e3408b8dd913edc719f787e525d6303416801eeecc1bbf4c5aa51447246952ec79cdac7106e379dca3a209a2bdcda7c19bac22e3822509b11e48ae7130

    • SSDEEP

      6144:Icaxda88spxIhnnwY9ZextcjXmFijjorrsRqEH+bNFbq1f+WvzP3O4yhu:Xa288EeRweZLXmFiPoMwrNxn8

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks