General

  • Target

    2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f

  • Size

    156KB

  • Sample

    221020-k2he3segcn

  • MD5

    8115772851e1fdcf57a48d4b8d4c12fe

  • SHA1

    35da657f12a22c2bb8773ba0a4e3e8dff0af4e53

  • SHA256

    2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f

  • SHA512

    406d7268d5ddd7d9a964a4acd6fa8c39e15d3465b55192c3c768dafccfb2fb5dc689c5ccf73dd31acc44329c9c227b77e32c8eebb56ca7c4b7bc248e25e890db

  • SSDEEP

    3072:M1wyHU/zhrXhGoFwrTgj7obINT3guCvp3BMs:MIzhrXhGoyrMPobUT3LCvp3BM

Malware Config

Targets

    • Target

      2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f

    • Size

      156KB

    • MD5

      8115772851e1fdcf57a48d4b8d4c12fe

    • SHA1

      35da657f12a22c2bb8773ba0a4e3e8dff0af4e53

    • SHA256

      2adb40401a2e732139725aff2a4dc3e8b3ad8c08c197c1bb73313ee5a1539b9f

    • SHA512

      406d7268d5ddd7d9a964a4acd6fa8c39e15d3465b55192c3c768dafccfb2fb5dc689c5ccf73dd31acc44329c9c227b77e32c8eebb56ca7c4b7bc248e25e890db

    • SSDEEP

      3072:M1wyHU/zhrXhGoFwrTgj7obINT3guCvp3BMs:MIzhrXhGoyrMPobUT3LCvp3BM

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks