General

  • Target

    9c3c1faa29b96b6e6841a7c8699c06b3474ddbbd2f29dac518455eca19aaeb2b

  • Size

    666KB

  • Sample

    221011-ksggesfafj

  • MD5

    47e6a34329a08e7c6111150605c40960

  • SHA1

    22f03c2cea3322be33034ae26452e3bb897f8750

  • SHA256

    9c3c1faa29b96b6e6841a7c8699c06b3474ddbbd2f29dac518455eca19aaeb2b

  • SHA512

    59454408d115c3fc4d42eb19887dd43028bd8f293fe4310d551085796f9c4ae365d9b6971e6ba0aff00a534c5c9bf93f0b4ff914af50a78c9032a32641aa3ae0

  • SSDEEP

    12288:aA8aQm8TWw169cNSM9jDYBlH8TWw169cNSM9jDYBlq:aAUmP+vNSoYBlHP+vNSoYBlq

Malware Config

Targets

    • Target

      9c3c1faa29b96b6e6841a7c8699c06b3474ddbbd2f29dac518455eca19aaeb2b

    • Size

      666KB

    • MD5

      47e6a34329a08e7c6111150605c40960

    • SHA1

      22f03c2cea3322be33034ae26452e3bb897f8750

    • SHA256

      9c3c1faa29b96b6e6841a7c8699c06b3474ddbbd2f29dac518455eca19aaeb2b

    • SHA512

      59454408d115c3fc4d42eb19887dd43028bd8f293fe4310d551085796f9c4ae365d9b6971e6ba0aff00a534c5c9bf93f0b4ff914af50a78c9032a32641aa3ae0

    • SSDEEP

      12288:aA8aQm8TWw169cNSM9jDYBlH8TWw169cNSM9jDYBlq:aAUmP+vNSoYBlHP+vNSoYBlq

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks