General

  • Target

    af587519aeb6d64f3559f7f93776c29523d3e613f1d6133fde09cb9e2685e620

  • Size

    936KB

  • Sample

    221020-bqwc5agfak

  • MD5

    93afcb782bfddfb4f60d114fe22fc05e

  • SHA1

    0125f4eb7cbd4eb14fedb74c3444a5ca50be8b24

  • SHA256

    af587519aeb6d64f3559f7f93776c29523d3e613f1d6133fde09cb9e2685e620

  • SHA512

    55dc4e2167a397187609bdf5cc3fddb874d3a58c70fd522b56bca396bcddda1ab73c08e413455a97ba2bf5c6ab8de2af888b76400e1a4e645984590d3686cdb7

  • SSDEEP

    12288:Cat0EAH49n8BOaQWVZXN4xxN5nltL0LkbUcpC/SDbO86Cuw78YOJEn1GUEVQqYHI:tt24byZKxldbouu68GGUEtsh7N1tEuc

Malware Config

Targets

    • Target

      af587519aeb6d64f3559f7f93776c29523d3e613f1d6133fde09cb9e2685e620

    • Size

      936KB

    • MD5

      93afcb782bfddfb4f60d114fe22fc05e

    • SHA1

      0125f4eb7cbd4eb14fedb74c3444a5ca50be8b24

    • SHA256

      af587519aeb6d64f3559f7f93776c29523d3e613f1d6133fde09cb9e2685e620

    • SHA512

      55dc4e2167a397187609bdf5cc3fddb874d3a58c70fd522b56bca396bcddda1ab73c08e413455a97ba2bf5c6ab8de2af888b76400e1a4e645984590d3686cdb7

    • SSDEEP

      12288:Cat0EAH49n8BOaQWVZXN4xxN5nltL0LkbUcpC/SDbO86Cuw78YOJEn1GUEVQqYHI:tt24byZKxldbouu68GGUEtsh7N1tEuc

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks