General

  • Target

    cc785f2a60e7154af09b2400351614312aa1593fe5e4ede46bda037a4af2dfef

  • Size

    500KB

  • Sample

    221020-g928nshgc5

  • MD5

    79c7e4a244017292cb2bdb39c304ae40

  • SHA1

    c25ff87a548815bbe31ced252dea455660a993c4

  • SHA256

    cc785f2a60e7154af09b2400351614312aa1593fe5e4ede46bda037a4af2dfef

  • SHA512

    3414ce05a3f217e6e90ff26041dc0fbc0e05b1ddf5af249c1e31f664c54c9586cae5e216de1b8ed58eba450e906450567336bf1fdf57a810b841285b13cf86c6

  • SSDEEP

    12288:OJu2fqhZxEb0YQF9RKVWPkN/eMaGfTFtaJ:OQ2wZagR0CI/oGbFO

Malware Config

Targets

    • Target

      cc785f2a60e7154af09b2400351614312aa1593fe5e4ede46bda037a4af2dfef

    • Size

      500KB

    • MD5

      79c7e4a244017292cb2bdb39c304ae40

    • SHA1

      c25ff87a548815bbe31ced252dea455660a993c4

    • SHA256

      cc785f2a60e7154af09b2400351614312aa1593fe5e4ede46bda037a4af2dfef

    • SHA512

      3414ce05a3f217e6e90ff26041dc0fbc0e05b1ddf5af249c1e31f664c54c9586cae5e216de1b8ed58eba450e906450567336bf1fdf57a810b841285b13cf86c6

    • SSDEEP

      12288:OJu2fqhZxEb0YQF9RKVWPkN/eMaGfTFtaJ:OQ2wZagR0CI/oGbFO

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks