General

  • Target

    093e7b2d19181f9194b40847aeab16b86ac159ddce7d553b607febc63400724f

  • Size

    485KB

  • Sample

    221020-1zw4fsgean

  • MD5

    e7bb4b978b5d6073c29d6b05a4e6f0d4

  • SHA1

    fde1e9d4b5272e80cac626bc2f45b970a2302e2d

  • SHA256

    093e7b2d19181f9194b40847aeab16b86ac159ddce7d553b607febc63400724f

  • SHA512

    9f827cc3bfa6324db8b094a41cdc36af71a185df341498940f274ccdd72d432cfd40fd418396d5dc5f63e48e851cf6faf7fdd9c53e06a15947f81375757402bc

  • SSDEEP

    6144:8P0T7oKuHVet3JA6CmbKw6F/zUCPCIcwyHH+5/gdVv1W+:8cfo9Vu3JYmCZjPyU/gFJ

Malware Config

Targets

    • Target

      093e7b2d19181f9194b40847aeab16b86ac159ddce7d553b607febc63400724f

    • Size

      485KB

    • MD5

      e7bb4b978b5d6073c29d6b05a4e6f0d4

    • SHA1

      fde1e9d4b5272e80cac626bc2f45b970a2302e2d

    • SHA256

      093e7b2d19181f9194b40847aeab16b86ac159ddce7d553b607febc63400724f

    • SHA512

      9f827cc3bfa6324db8b094a41cdc36af71a185df341498940f274ccdd72d432cfd40fd418396d5dc5f63e48e851cf6faf7fdd9c53e06a15947f81375757402bc

    • SSDEEP

      6144:8P0T7oKuHVet3JA6CmbKw6F/zUCPCIcwyHH+5/gdVv1W+:8cfo9Vu3JYmCZjPyU/gFJ

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks