General

  • Target

    ed9aa84319abed34e632722d0c483a31195e103f21ddfec4423a5b0c4fd89135

  • Size

    292KB

  • Sample

    221014-g9bqqabgcq

  • MD5

    46f72a9792eed693a7d4516e8b726f55

  • SHA1

    05c6265aeb56ff9900963189e04735d0ff52ba80

  • SHA256

    ed9aa84319abed34e632722d0c483a31195e103f21ddfec4423a5b0c4fd89135

  • SHA512

    bf1f20aa401979b04c306036b0c73280bcfc13981723284679597cf26e74c0dd0158a498377a50bf694eab4c2ca96fd06780f76b5febe38af88d22d6c6e4e6d0

  • SSDEEP

    6144:IHVtad+e62517rYpuvyjtin+x1VIs+SupvgVRnSBR9DICTxRgDKNzM:Y8d+eZ7rYpuvyjt9mscpkRnSBRm5K9

Malware Config

Targets

    • Target

      ed9aa84319abed34e632722d0c483a31195e103f21ddfec4423a5b0c4fd89135

    • Size

      292KB

    • MD5

      46f72a9792eed693a7d4516e8b726f55

    • SHA1

      05c6265aeb56ff9900963189e04735d0ff52ba80

    • SHA256

      ed9aa84319abed34e632722d0c483a31195e103f21ddfec4423a5b0c4fd89135

    • SHA512

      bf1f20aa401979b04c306036b0c73280bcfc13981723284679597cf26e74c0dd0158a498377a50bf694eab4c2ca96fd06780f76b5febe38af88d22d6c6e4e6d0

    • SSDEEP

      6144:IHVtad+e62517rYpuvyjtin+x1VIs+SupvgVRnSBR9DICTxRgDKNzM:Y8d+eZ7rYpuvyjt9mscpkRnSBRm5K9

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks