General

  • Target

    82112544fc9f81ccab9fbc8c8f1614b92091b87171f925a0e39b8c5694f23369

  • Size

    964KB

  • Sample

    221011-sb53fsagc2

  • MD5

    615df21a56a0808841a781755c4e5e70

  • SHA1

    6079cfbb1816cb7992ae472fe805b54a9a3cf03c

  • SHA256

    82112544fc9f81ccab9fbc8c8f1614b92091b87171f925a0e39b8c5694f23369

  • SHA512

    040962c0fe921cb8c1cadbcc4e76e40977080e83f500144beb4c59b40337907649904c01557d6c55b6d8ba3c3526bd15876b89479909406a5a7c04d8529464da

  • SSDEEP

    24576:CthEVaPqLfq0df9k3C6QTnARS6jT01bi4v+PRzu97bDLFfi6WUrALUgx9RO:aEVUcy0jB

Malware Config

Targets

    • Target

      82112544fc9f81ccab9fbc8c8f1614b92091b87171f925a0e39b8c5694f23369

    • Size

      964KB

    • MD5

      615df21a56a0808841a781755c4e5e70

    • SHA1

      6079cfbb1816cb7992ae472fe805b54a9a3cf03c

    • SHA256

      82112544fc9f81ccab9fbc8c8f1614b92091b87171f925a0e39b8c5694f23369

    • SHA512

      040962c0fe921cb8c1cadbcc4e76e40977080e83f500144beb4c59b40337907649904c01557d6c55b6d8ba3c3526bd15876b89479909406a5a7c04d8529464da

    • SSDEEP

      24576:CthEVaPqLfq0df9k3C6QTnARS6jT01bi4v+PRzu97bDLFfi6WUrALUgx9RO:aEVUcy0jB

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks