General

  • Target

    5dddd24250846a011d3fbaadfe15b9f5043aff2d613bb47494e1bc6b3d2d3e3c

  • Size

    953KB

  • Sample

    221014-ckswgscdap

  • MD5

    5ed705a5806ff30357438889fc817d50

  • SHA1

    975a660296cd4da150ece48e5643954cf9790dcb

  • SHA256

    5dddd24250846a011d3fbaadfe15b9f5043aff2d613bb47494e1bc6b3d2d3e3c

  • SHA512

    10d608c29fcf2e9347484c30f09f3b987a35ef687813ba35fde0c3c2bbdaaae79a049b855a38516d1b9c052d8923fb17623022da84a6d63d7dc4d09a010dca67

  • SSDEEP

    24576:KRmJkcoQricOIQxiZY1iadCQwpqBJ3cyU9nF1KY:PJZoQrbTFZY1iadCn6J3cyqnF1z

Malware Config

Targets

    • Target

      5dddd24250846a011d3fbaadfe15b9f5043aff2d613bb47494e1bc6b3d2d3e3c

    • Size

      953KB

    • MD5

      5ed705a5806ff30357438889fc817d50

    • SHA1

      975a660296cd4da150ece48e5643954cf9790dcb

    • SHA256

      5dddd24250846a011d3fbaadfe15b9f5043aff2d613bb47494e1bc6b3d2d3e3c

    • SHA512

      10d608c29fcf2e9347484c30f09f3b987a35ef687813ba35fde0c3c2bbdaaae79a049b855a38516d1b9c052d8923fb17623022da84a6d63d7dc4d09a010dca67

    • SSDEEP

      24576:KRmJkcoQricOIQxiZY1iadCQwpqBJ3cyU9nF1KY:PJZoQrbTFZY1iadCn6J3cyqnF1z

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks